Author:
Rahimunnisa K.,Varkey Rincy Merrin,Sureshkumar S.
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper Resistance Mechanisms for Secure, Embedded Systems. In: Proc. 17th Int’l Conf Very Large Scale Integration Design, VLSI Design 2004 (2004)
2. Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-Flow Integrity Principles, Implementations, and Applications. In: Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 340–353 (November 2005)
3. Arora, D., Ravi, S., Raghunathan, A., Jha, N.K.: Hardware Asisted run-Time Monitoring for Secure program execution on embedded processors. IEEE Transaction Very Large Scale Integration Systems (VLSI) 14(12), 1295–1307 (2006)
4. Gogniat, G., Wolf, T., Burleson, W., Diguet, J.-P., Bossuet, L., Vaslin, R.: Reconfigurable Hardware for High-Security/High-Performance Embedded Systems: The SAFES Perspective. IEEE Trans. Very Large Scale Integration (VLSI) Systems 16(2), 144–155 (2008)
5. Zambreno, J., Choudhary, A., Simha, R., Narahari, B., Memon, N.: SAFEOPS: An Approach to Embedded Software Security. ACM Trans. Embedded Computing Systems 4(1), 189–210 (2005)