메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Half-blind attacks: Mask ROM bootloaders are dangerous

Author keywords

[No Author keywords available]

Indexed keywords

BUFFER STORAGE;

EID: 85084164484     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (14)
  • 1
    • 78650317653 scopus 로고    scopus 로고
    • ATMEL INC. Atmel documentation DOC6175, December
    • ATMEL INC. AT91 ARM Thumb-based microcontrollers. Atmel documentation DOC6175, December 2008.
    • (2008) AT91 ARM Thumb-Based Microcontrollers
  • 2
    • 33745855808 scopus 로고    scopus 로고
    • Tampering with motes: Real-world physical attacks on wireless sensor networks
    • BECHER, A., BENENSON, Z., AND DORNSEIF, M. Tampering with motes: Real-world physical attacks on wireless sensor networks. In SPC (2006), pp. 104–118.
    • (2006) SPC , pp. 104-118
    • Becher, A.1    Benenson, Z.2    Dornseif, M.3
  • 3
    • 85032256743 scopus 로고    scopus 로고
    • Code injection attacks on harvard-architecture devices
    • FRANCILLON, A., AND CASTELLUCIA, C. Code injection attacks on Harvard-architecture devices. In CCS (2008).
    • (2008) CCS
    • Francillon, A.1    Castellucia, C.2
  • 4
    • 85080623664 scopus 로고    scopus 로고
    • Stack overflow exploits of 802.15.4 wireless sensors
    • September
    • GOODSPEED, T. Stack overflow exploits of 802.15.4 wireless sensors. Toorcon, September 2007.
    • (2007) Toorcon
    • Goodspeed, T.1
  • 9
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits (pax case study)
    • NERGAL. The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine 58, 4 (2001).
    • (2001) Phrack Magazine , vol.58 , pp. 4
    • Nergal1
  • 11
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • SHACHAM, H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In CCS (2007).
    • (2007) CCS
    • Shacham, H.1
  • 13
    • 27244445173 scopus 로고    scopus 로고
    • Semi-invasive attacks – a new approach to hardware security analysis
    • University of Cambridge, ISBN
    • SKOROBOGATOV, S. P. Semi-invasive attacks – A new approach to hardware security analysis. Doctor of Philosophy, University of Cambridge, 2005. ISBN 9729961506.
    • (2005) Doctor of Philosophy
    • Skorobogatov, S.P.1
  • 14
    • 77950832584 scopus 로고    scopus 로고
    • SOLAR DESIGNER. Bugtraq mailing list, August
    • SOLAR DESIGNER. return-to-libc attack. Bugtraq mailing list, August 1997.
    • (1997) Return-to-Libc Attack


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.