Author:
Wolf Marilyn,Serpanos Dimitrios
Publisher
Springer International Publishing
Reference21 articles.
1. ARM Limited, ARM Security Technology: building a secure system using TrustZone technology, 2009. Available at www.arm.com
2. L. Davi, A. Dmitrienko, A.-R. Sadeghi, M. Winady, Privilege escalation attacks on Android, in ed. by M. Burmeister Gene Tsudik, S. Magliveras, I. Ilic, ISC 2010, LNCS 6531 (Springer, 2011), pp. 346–360
3. M. Eby, J. Werner, G. Karsai, A. Ledeczi, Integrating security modeling into embedded system design, in 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS’07), Tucson, 2007, pp. 221–228. https://doi.org/10.1109/ECBS.2007.45
4. SEI Series in Software Engineering;PH Feiler,2012
5. T.A. Henzinger, B. Horowitz, C.M. Kirsch, Giotto: a time-triggered language for embedded programming. Proc. IEEE 91(1), 84–99 (2003)