Browse > Article

임베디드시스템 설계에서의 보안 기술  

Jeon Yong-Hui (대구가톨릭대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall,1998
2 B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, 1996.
3 Common Vulnerabilities and Exposures. (http://cve.mitre.org/)
4 D. Brumley and D. Boneh, "Remote Timing Attacks Are Practical ," in Proc. 12th USENIX Security Symp; pp. 1-14, Aug. 2003
5 A. Arbaugh, D. 1. Farber, and 1. M. Smith, "A Secure and Reliable BootStrap Architecture," in Proc. of IEEE Symposium on Security and Privacy, pp. 6571, May 1997
6 D. Lie, C. A. Thekkath, and M. Horowitz, "Implementing an untrusted operating system on trusted hardware," in Proc. ACM Symposium on Operating Systems Principles, pp. 178-192, Oct. 2003
7 Next-Generation Secure Computing Base (NGSCB). Microsoft Inc. (http://www.microsoft.com/resources/ngscb/productinf o.mspx)
8 B. Yee, Using Secure Co-processors. PhD thesis, Carnegie Mellon University, 1994
9 Trusted Computing Group. (https:/www.trustedcomputinggroup.org/horne)
10 Discretix Technologies Ltd. (http://www.discretix.com)
11 G. C. Necula and P. Lee, "Proof-Carrying Code," Tech. Rep. MU-CS-96165,Carnegie Mellon University, Nov. 1996
12 G. Hoglund and G. McGraw, Exploiting Software: How to Break Code http://www.exploitingsoftware.com) , Addison- Wesley, 2004
13 Biometrics and Network Security. Prentice Hall PTR, 2003
14 S. Ravi, A. Raghunathan, and N. Potlapally, u Securing wireless data: System architecture challenges," in Proc. Inti. Symp. System Synthesis, pp. 195-200, October 2002
15 P. Kocher, J. Jaffe, and B. Jun, Introduction to differential power analysis and related attacks. (http://www.cryptography.com/resources/whitepapers/)
16 S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper Resistance Mechanisms for Secure Embedded Systems," in Proc. Int. Coni VLSI Design, Jan. 2004
17 OpenIPMP. http://www.openipmp.org
18 O. Kommerling and M. G. Kuhn, "Design principles for tamper-resistant smartcard processors," in Proc. USENIX Workshop on Smartcard Technology (Smartcard '99),pp. 9-20, May 1999
19 D. Boneh, R. DeMillo, and R. Lipton, "On the importance of checking cryptographic protocols for faults" , in Proc. of Eurocrypt'97, pp. 37-51, 1997
20 SSL 3.0 Specification. http://wp.netscape.com/eng/ssl31
21 IPSec Working Group. http://www.ietf.org/html.charters/ipsec - charter .html
22 S. Govindavajhala and A. W. Appel, "Using Memory Errors to Attack a Virtual Machine," in Proc. IEEE Symposium on Security and Privacy, pp. 154-165, May 2003
23 K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic analysis: Concrete results," in Proc. Cryptographic Hardware and Embedded Systems, pp. 251-261, 2001   DOI   ScienceOn
24 Internet Streaming Media Alliance. httpi/www.isma.tv/horne
25 Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, "Security as a New Dimension in Embedded System Design", ACM, pp. 753-760, June 2004