메뉴 건너뛰기




Volumn , Issue , 2010, Pages 70-77

Live forensics framework for wireless sensor nodes using sandboxing

Author keywords

Live forensics; Sandboxing; Wireless sensor networks.

Indexed keywords

MOBILE TELECOMMUNICATION SYSTEMS; QUALITY OF SERVICE; SENSOR NODES; WIRELESS NETWORKS;

EID: 85015247487     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1868630.1868643     Document Type: Conference Paper
Times cited : (9)

References (33)
  • 3
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • Nov
    • R. Anderson, ?Why Cryptosystems Fail, ? Comm. ACM, vol. 37, no. 11, Nov. 1994
    • (1994) Comm ACM , vol.37 , Issue.11
    • Anderson, R.1
  • 9
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • M. Blum and S. Kannan, ?Designing Programs that Check Their Work, ? J. ACM, vol. 42, no. 1, 1995
    • (1995) J ACM , vol.42 , Issue.1
    • Blum, M.1    Kannan, S.2
  • 10
    • 0031274275 scopus 로고    scopus 로고
    • Software reliability via run-time result-checking
    • H. Wasserman and M. Blum, ?Software Reliability via Run-Time Result-Checking, ? J. ACM, vol. 44, no. 6, 1997
    • (1997) J ACM , vol.44 , Issue.6
    • Wasserman, H.1    Blum, M.2
  • 12
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • Springer-Verlag
    • D. Aucsmith, ?Tamper Resistant Software: An Implementation, ? Information Hiding, pp. 317-333, Springer-Verlag, 1996
    • (1996) Information Hiding , pp. 317-333
    • Aucsmith, D.1
  • 13
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation-tools for software protection
    • Aug
    • C.S. Collberg and C. Thomborson, ?Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection, ? IEEE, Trans. Software Eng., vol. 28, no. 8, Aug. 2002
    • (2002) IEEE Trans. Software Eng , vol.28 , Issue.8
    • Collberg, C.S.1    Thomborson, C.2
  • 18
  • 19
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • F. Hohl, ?Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts, ? Mobile Agents and Security, 1998
    • (1998) Mobile Agents and Security
    • Hohl, F.1
  • 22
    • 19944369062 scopus 로고    scopus 로고
    • Soft tamper-proofing via program integrity verification in wireless sensor networks
    • May/June
    • Taejoon Park, Kang G. Shin, ?Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks?, IEEE Transactions on mobile computing, VOL. 4, NO. 3, May/June 2005
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.3
    • Park, T.1    Shin, K.G.2
  • 23
    • 85026766895 scopus 로고    scopus 로고
    • Squawk Project
    • Squawk Project, http://labs.oracle.com/projects/squawk/
  • 24
    • 85026732286 scopus 로고    scopus 로고
    • Nergal The advanced return-into-lib(c) exploits (PaX case . Phrack Magazine
    • Nergal. The advanced return-into-lib(c) exploits (PaX case . Phrack Magazine.)
  • 32
    • 85026732869 scopus 로고    scopus 로고
    • http://www.xbow.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.