1 |
A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, "SWATT: Software-based attestation for embedded devices," Proceedings of IEEE Symposium on Security and Privacy. pp. 272-282, May. 2004.
|
2 |
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla, "SCUBA: Secure Code Update By Attestation in sensor networks," Proceedings of ACM workshop on Wireless security, pp. 85-94, Sep. 2006.
|
3 |
JongHyup Lee, LeeHyung Kim, and Taekyoung Kwon, "Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks," IEEE Transactions on Industrial Informatics, (early access), Aug. 2015.
|
4 |
Paul Craig, Mark Ron. Software Piracy Exposed - Secrets from the Dark Side Revealed, Andrew Williams, 2015.
|
5 |
Gunnar Blom, Lars Holst, Dennis Sandell, Problems and Snapshots from the World of Probability, Springer-Verlag, 1994.
|
6 |
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Control-flow integrity principles, implementations, and applications," ACM Transactions on Information and System Security, vol. 13, no. 1, pp. 4:1-40, Oct. 2009.
|
7 |
G. Necula, S. McPeak, and S. Rahul, "CIL: Intermediate language and tools for analysis and transformation of C programs," Compiler Construction, pp 213-228,, Springer, Jan. 2002.
|
8 |
NIST Software Assusrance Reference Dataset, http://samate.nist.gov/SARD/
|