메뉴 건너뛰기




Volumn , Issue , 2015, Pages 310-321

SIoT: Securing the Internet of Things through distributed system analysis

Author keywords

Buffer overflow; Distributed system analysis; Internet of Things; Software security

Indexed keywords

ALGORITHMS; BUFFER STORAGE; ENERGY EFFICIENCY; INFORMATION SCIENCE; INTERNET; INTERNET OF THINGS; NETWORK SECURITY; SEMANTICS; SENSOR NETWORKS; SYSTEMS ANALYSIS;

EID: 84954134251     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2737095.2737097     Document Type: Conference Paper
Times cited : (15)

References (39)
  • 1
    • 84976844361 scopus 로고
    • Control flow analysis
    • F. E. Allen. Control flow analysis. ACM Sigplan Notices, 5:1-19, 1970.
    • (1970) ACM Sigplan Notices , vol.5 , pp. 1-19
    • Allen, F.E.1
  • 2
    • 80955160447 scopus 로고    scopus 로고
    • That 'Internet of things' thing
    • K. Ashton. That 'Internet of Things' Thing. RFiD Journal, 22:97-114, 2009.
    • (2009) RFID Journal , vol.22 , pp. 97-114
    • Ashton, K.1
  • 3
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito. The Internet of Things: A survey. Computer Networks, 54(15):2787-2805, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 7
    • 34547472598 scopus 로고    scopus 로고
    • MPIPP: An automatic profile-guided parallel process placement toolset for smp clusters and multiclusters
    • ACM
    • H. Chen, W. Chen, J. Huang, B. Robert, and H. Kuhn. MPIPP: An automatic profile-guided parallel process placement toolset for smp clusters and multiclusters. In International Conference on Supercomputing. ACM, 2006.
    • (2006) International Conference on Supercomputing
    • Chen, H.1    Chen, W.2    Huang, J.3    Robert, B.4    Kuhn, H.5
  • 12
  • 15
  • 18
    • 85014149843 scopus 로고    scopus 로고
    • Trusted platform module basics: Using TPM in embedded systems
    • S. L. Kinney. Trusted platform module basics: using TPM in embedded systems. Newnes, 2006.
    • (2006) Newnes
    • Kinney, S.L.1
  • 22
    • 84864839734 scopus 로고    scopus 로고
    • Watchdog: Hardware for safe and secure manual memory management and full memory safety
    • S. Nagarakatte, M. M. Martin, and S. Zdancewic. Watchdog: Hardware for safe and secure manual memory management and full memory safety. Computer Architecture News, 40(3):189-200, 2012.
    • (2012) Computer Architecture News , vol.40 , Issue.3 , pp. 189-200
    • Nagarakatte, S.1    Martin, M.M.2    Zdancewic, S.3
  • 30
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • Also in MobiCom'01
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, 2002. Also in MobiCom'01.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Wen, V.3    Culler, D.4    Tygar, J.D.5
  • 34
    • 77955182005 scopus 로고    scopus 로고
    • All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
    • IEEE
    • E. J. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Symposium on Security and Privacy (S&P). IEEE, 2010.
    • (2010) Symposium on Security and Privacy (S&P)
    • Schwartz, E.J.1    Avgerinos, T.2    Brumley, D.3
  • 36
    • 84869398221 scopus 로고    scopus 로고
    • The atom LEAP platform for energy-efficient embedded computing
    • D. Singh and W. J. Kaiser. The atom LEAP platform for energy-efficient embedded computing. Technical Report 88b146bk, UCLA, 2010.
    • (2010) Technical Report 88b146bk, UCLA
    • Singh, D.1    Kaiser, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.