1 |
Trusted Computing Group, "TCG TPM Specification, Version 1.2, Revision 103," https://www.trustedcomputinggroup.org/specs/TPM, 2007.
|
2 |
W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A Secure and Reliable Bootstrap Architecture," in IEEE Symposium on Security and Privacy. IEEE, 1997, pp. 65-1.
|
3 |
K. Shimizu, "The Cell Broadband Engine Processor Security Architecture," http://www.ibm.com/developerworks/power/library/ pa-cellsecurity/, Apr. 2006.
|
4 |
Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, "Security as a New Dimension in Embedded System Design", ACM, pp. 753-760, June 2004.
|
5 |
S. Rabi, A. Raghunathan, and S. Chakradhar. "Temper Resistance Mechanisms for Secure Embedded Systems", in Proc. int. Conf. ,Jan. 2004.
|
6 |
Eric James Lorden. "A Secure Software Platform for Real-Time Embedded Systems", Bradley Department of Electrical and Computer Engineering Blacksburg, Virginia December 15, 2006
|
7 |
Vulnerability notes database, CERT coordinationcenter: http://www.kb.cert.org/vuls/, 2006.
|
8 |
Black, Paul E. F, "Fisher-Yates shuffle", Dictionary of Algorithms and Data Structures, National Institute of Standards and Technology, Retrieved 2007-08-09.
|
9 |
Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe. "Secure Execution Via Program Shepherding." MIT Press, 2002, pp. 191-206.
|
10 |
E. Naess, D. A. Frincke, A. D. McKinnon, and D. E. Bakken, "Configurable middlewarelevel intrusion detection for embedded systems," International Workshop on Security in Distributed Computing Systems, vol. 02, pp. 144-151, 2005
|