|
Volumn , Issue , 2009, Pages
|
Half-blind attacks: Mask ROM bootloaders are dangerous
|
Author keywords
[No Author keywords available]
|
Indexed keywords
BUFFER STORAGE;
BOOT LOADERS;
BRUTE FORCE;
BUFFER OVERFLOWS;
ENTRY POINT;
EXTRACTION TECHNIQUES;
PRACTICAL METHOD;
RETURN-ORIENTED PROGRAMMING;
SOFTWARE VULNERABILITIES;
FIRMWARE;
|
EID: 85084164484
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (13)
|
References (14)
|