1 |
A. Murat Fiskiran, Ruby B. Lee, 'Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution', ICCD 2004, pp. 452-457, Oct. 2004
DOI
|
2 |
Andrew Huang, 'Keeping Secrets in Hardware: The Microsoft XboxTM Case Study,' Cryptographic Hardware and Embedded Systems - CHES 2002, pp. 213 - 227, Aug. 2002
DOI
|
3 |
R. B. Lee, et al. 'Enlisting hardware architecture to thwart malicious code injection', In Proceedings of the 2003 International Conference on Security in Pervasive Computing, 2003
|
4 |
S. Ravi, et al., 'Security in Embedded Systems: Design Challenges' in ACM Transactions on Embedded Computing Systems, 2004
|
5 |
Milena Milenkovi, et al., 'A framework for trusted instruction execution via basic block signature verification' ACM Southeast Regional Conference Proc. of the 42nd annual Southeast regional conference, pp. 191-196, 2004
|
6 |
J.P. McGregor, et al., 'A Processor Architecture Defense against Buffer Overflow Attacks', Proc. IEEE Int. Conf. Information Technology: Research and Education (ITRE), pp. 243-250, Aug. 2003
DOI
|
7 |
Irving S. Reed and Xuemin Chen, 'Error-Control coding for Data Network', Kluwer Academic Publishers, 1999
|