메뉴 건너뛰기




Volumn , Issue , 2011, Pages 285-300

Hardware controlled systematic approach to detect and prevent virus

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84967361943     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1142/9789814273046_0011     Document Type: Chapter
Times cited : (1)

References (31)
  • 1
    • 84967419665 scopus 로고    scopus 로고
    • The ever-growing virus crisis
    • A. Salkever, The ever-growing virus crisis. In Business Week Online, http://www.businessweek.com/technology/content/aug2003/tc20030826 4386 tc047.htm.
    • Business Week Online
    • Salkever, A.1
  • 2
    • 84967514266 scopus 로고    scopus 로고
    • Attacks on the internet in 2003
    • R. Pethia, Attacks on the internet in 2003. In Congressional Testimony, http://usinfo.state.gov/journals/itgic/1103/ijge/gjlla.htm.
    • Congressional Testimony
    • Pethia, R.1
  • 3
    • 84967363794 scopus 로고    scopus 로고
    • Sobig.F breaks speed records
    • G. Law, Sobig.f breaks speed records. In PC World, http://www.pcworld.com/news/article/0, aid,112108,00.asp.Computervirus, http://en.wikipedia.org/wiki/.
    • PC World
    • Law, G.1
  • 9
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis and implications
    • May
    • P. D’haeseleer, S. Forrest, and P. Helman, An immunological approach to change detection: algorithms, analysis and implications, In IEEE Symposium on Security and Privacy, pp. 110-119, (May, 1996).
    • (1996) IEEE Symposium on Security and Privacy , pp. 110-119
    • D’haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 20
    • 0018995481 scopus 로고
    • Preventing software piracy with crypto-microprocessors
    • R. M. Best, Preventing software piracy with crypto-microprocessors. In IEEE Spring COMPCON 80, pp. 466-469, (Feb. 1980).
    • (1980) IEEE Spring COMPCON 80, Pp. 466-469
    • Best, R.M.1
  • 22
    • 21644434531 scopus 로고
    • Dyad: A system for using physically secure coprocessors
    • J. D. Tygar and B. Yee, Dyad: A system for using physically secure coprocessors. In IP Workshop Proceedings, (1994).
    • (1994) IP Workshop Proceedings
    • Tygar, J.D.1    Yee, B.2
  • 23
    • 2642578695 scopus 로고
    • An introduction to citadel — a secure crypto coprocessor for workstations
    • Y. R. Palmer, An introduction to citadel — a secure crypto coprocessor for workstations. In the IFIP SEC94 Conference, (1994).
    • (1994) The IFIP SEC94 Conference
    • Palmer, Y.R.1
  • 28
    • 33645215766 scopus 로고    scopus 로고
    • Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    • Apr
    • Z. Shao, C. Xue, Q. Zhuge, M. Qiu, B. Xiao, and E. H.-M. Sha, Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software, IEEE Trans, on Computers, 55(4), 443-453, (Apr., 2006).
    • (2006) IEEE Trans, on Computers , vol.55 , Issue.4 , pp. 443-453
    • Shao, Z.1    Xue, C.2    Zhuge, Q.3    Qiu, M.4    Xiao, B.5    Sha, E.H.6
  • 29
    • 40449085159 scopus 로고    scopus 로고
    • Dependability and security will change embedded computing
    • D. Serpanos and J. Henkel, Dependability and security will change embedded computing, IEEE Computer, 41 (1), 103-105, (Jan. 2008).
    • (2008) IEEE Computer , vol.41 , Issue.1 , pp. 103-105
    • Serpanos, D.1    Henkel, J.2
  • 30
    • 39849091652 scopus 로고    scopus 로고
    • Where does security stand? New vulnerabilities vs. Trusted computing
    • (Dec
    • S. Gueron, G. Stronqin, J. Seifert, D. Chiou, R. Sendag, and J. Yi, Where does security stand? new vulnerabilities vs. trusted computing, IEEE Micro., 27(6), 25-35, (Dec. 2007).
    • (2007) IEEE Micro , vol.27 , Issue.6 , pp. 25-35
    • Gueron, S.1    Stronqin, G.2    Seifert, J.3    Chiou, D.4    Sendag, R.5    Yi, J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.