-
1
-
-
84971298930
-
-
Jeep Hacking 101., Aug
-
Jeep Hacking 101. IEEE Spectrum, Aug 2015. http://spectrum.ieee.org/ cars-that-think/transportation/systems/jeep-hacking-101.
-
(2015)
IEEE Spectrum
-
-
-
2
-
-
0000703331
-
Applying new scheduling theory to static priority pre-emptive scheduling
-
N. Audsley, A. Burns, M. Richardson, K. Tindell, and A. J. Wellings. Applying new scheduling theory to static priority pre-emptive scheduling. Software Engineering Journal, 8:284-292, 1993.
-
(1993)
Software Engineering Journal
, vol.8
, pp. 284-292
-
-
Audsley, N.1
Burns, A.2
Richardson, M.3
Tindell, K.4
Wellings, A.J.5
-
6
-
-
84945195324
-
Readactor: Practical code randomization resilient to memory disclosure
-
S. Crane, C. Liebchen, A. Homescu, L. Davi, P. Larsen, A.-R. Sadeghi, S. Brunthaler, and M. Franz. Readactor: Practical code randomization resilient to memory disclosure. In Proc. of the IEEE Symposium on Security and Privacy, 2015.
-
(2015)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Crane, S.1
Liebchen, C.2
Homescu, A.3
Davi, L.4
Larsen, P.5
Sadeghi, A.-R.6
Brunthaler, S.7
Franz, M.8
-
7
-
-
84877943121
-
Gadge me if you can: Secure and efficient ad-hoc instruction-level randomization for x86 and arm
-
L. V. Davi, A. Dmitrienko, S. Nürnberger, and A.-R. Sadeghi. Gadge me if you can: Secure and efficient ad-hoc instruction-level randomization for x86 and arm. In Proc. of the ACM SIGSAC symposium on Information, computer and communications security, 2013.
-
(2013)
Proc. of the ACM SIGSAC Symposium on Information, Computer and Communications Security
-
-
Davi, L.V.1
Dmitrienko, A.2
Nürnberger, S.3
Sadeghi, A.-R.4
-
9
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Springer
-
P. C. Kocher. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In Proc. of the Annual International Cryptology Conference, volume 1109 of Lecture Notes in Computer Science. Springer, 1996.
-
(1996)
Proc. of the Annual International Cryptology Conference, Volume 1109 of Lecture Notes in Computer Science
-
-
Kocher, P.C.1
-
10
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. In Proc. of the IEEE Symposium on Security and Privacy, 2010.
-
(2010)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
11
-
-
84880911285
-
Fixed priority scheduling of periodic task sets with arbitrary deadlines
-
J. Lehoczky. Fixed priority scheduling of periodic task sets with arbitrary deadlines. In Proc. of the IEEE Real-Time Systems Symposium, 1990.
-
(1990)
Proc. of the IEEE Real-Time Systems Symposium
-
-
Lehoczky, J.1
-
12
-
-
84974687699
-
Scheduling algorithms for multiprogramming in a hard real-time environment
-
C. L. Liu and J. W. Layland. Scheduling algorithms for multiprogramming in a hard real-time environment. Journal of the ACM, 20(1):46-61, 1973.
-
(1973)
Journal of the ACM
, vol.20
, Issue.1
, pp. 46-61
-
-
Liu, C.L.1
Layland, J.W.2
-
13
-
-
84945191701
-
Last-level cache side-channel attacks are practical
-
F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R. Lee. Last-level cache side-channel attacks are practical. In Proc. of the IEEE Symposium on Security and Privacy, 2015.
-
(2015)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Liu, F.1
Yarom, Y.2
Ge, Q.3
Heiser, G.4
Lee, R.5
-
14
-
-
84877600779
-
S3A: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems
-
S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha, and M. Caccamo. S3A: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems. In Proc. of the ACM Conference on High Confidence Networked Systems, 2013.
-
(2013)
Proc. of the ACM Conference on High Confidence Networked Systems
-
-
Mohan, S.1
Bak, S.2
Betti, E.3
Yun, H.4
Sha, L.5
Caccamo, M.6
-
17
-
-
84944674060
-
A generalized model for preventing information leakage in hard realtime systems
-
R. Pellizzoni, N. Paryab, M.-K. Yoon, S. Bak, S. Mohan, and R. Bobba. A generalized model for preventing information leakage in hard realtime systems. In Proc. of the IEEE Real-Time Embedded Technology and Applications Symposium, 2015.
-
(2015)
Proc. of the IEEE Real-Time Embedded Technology and Applications Symposium
-
-
Pellizzoni, R.1
Paryab, N.2
Yoon, M.-K.3
Bak, S.4
Mohan, S.5
Bobba, R.6
-
19
-
-
0025488794
-
Priority inheritance protocols: An approach to real-time synchronization
-
Sept
-
L. Sha, R. Rajkumar, and J. P. Lehoczky. Priority inheritance protocols: An approach to real-time synchronization. IEEE Trans. Comput., 39(9):1175-1185, Sept. 1990.
-
(1990)
IEEE Trans. Comput
, vol.39
, Issue.9
, pp. 1175-1185
-
-
Sha, L.1
Rajkumar, R.2
Lehoczky, J.P.3
-
20
-
-
84856043672
-
A mathematical theory of communication
-
July
-
C. Shannon. A mathematical theory of communication. Bell System Technical Journal, The, 27(3):379-423, July 1948.
-
(1948)
Bell System Technical Journal, the
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.1
-
22
-
-
33845924790
-
Covert timing channel analysis of rate monotonic real-time scheduling algorithm in mls systems
-
J. Son and J. Alves-Foss. Covert timing channel analysis of rate monotonic real-time scheduling algorithm in mls systems. In Proc. of the IEEE Information Assurance Workshop, 2006.
-
(2006)
Proc. of the IEEE Information Assurance Workshop
-
-
Son, J.1
Alves-Foss, J.2
-
27
-
-
84881112280
-
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
-
M.-K. Yoon, S. Mohan, J. Choi, J.-E. Kim, and L. Sha. SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems. In Proc. of the IEEE Real-Time Embedded Technology and Applications Symposium, 2013.
-
(2013)
Proc. of the IEEE Real-Time Embedded Technology and Applications Symposium
-
-
Yoon, M.-K.1
Mohan, S.2
Choi, J.3
Kim, J.-E.4
Sha, L.5
-
29
-
-
84910141311
-
SiPTA: Signal processing for trace-based anomaly detection
-
M. M. Z. Zadeh, M. Salem, N. Kumar, G. Cutulenco, and S. Fischmeister. SiPTA: Signal processing for trace-based anomaly detection. In Proc. of the International Conference on Embedded Software, 2014.
-
(2014)
Proc. of the International Conference on Embedded Software
-
-
Zadeh, M.M.Z.1
Salem, M.2
Kumar, N.3
Cutulenco, G.4
Fischmeister, S.5
|