Purple Team Security Assessment of Firmware Vulnerabilities
Author:
Publisher
Springer International Publishing
Link
https://link.springer.com/content/pdf/10.1007/978-3-030-82529-4_36
Reference16 articles.
1. Veerasamy N (2009) High-level methodology for carrying out combined red and blue teams. In: 2009 second international conference on computer and electrical engineering, Dubai, pp 416–420. https://doi.org/10.1109/ICCEE.2009.177
2. Waksman A, Rajendran J, Suozzo M, Sethumadhavan S (2017) A red team/blue team assessment of functional analysis methods for malicious circuit identification. In: 2014 51st ACM/EDAC/IEEE design automation conference (DAC), San Francisco, CA, pp 1–4
3. Rajendran J, Jyothi V, Karri R (2011) Blue team red team approach to hardware trust assessment. In: 2011 IEEE 29th international conference on computer design (ICCD), Amherst, MA, pp 285–288. https://doi.org/10.1109/ICCD.2011.6081410
4. Bresch C, Michelet A, Amato L, Meyer T, Hely D (2017) A red team blue team approach towards a secure processor design with hardware shadow stack. In: 2017 IEEE 2nd international verification and security workshop (IVSW), Thessaloniki, pp 57–62.https://doi.org/10.1109/IVSW.2017.8031545
5. Olivero MA, Bertolino A, Dominguez-Mayo FJ, Escalona MJ, Matteucci I (2019) Security assessment of systems of systems. In: 2019 IEEE/ACM 7th international workshop on software engineering for systems-of-systems (SESoS) and 13th workshop on distributed software development, software ecosystems and systems-of-systems (WDES), Montreal, QC, Canada, pp 62–65.https://doi.org/10.1109/SESoS/WDES.2019.00017
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3