SAFE-OPS: An approach to embedded software security

作者: Joseph Zambreno , Alok Choudhary , Rahul Simha , Bhagi Narahari , Nasir Memon

DOI: 10.1145/1053271.1053279

关键词:

摘要: … hackers in attacking a software system. In this paper, we introduce a unique approach to embedded software protection that utilizes a hardware/software codesign methodology. Results …

参考文章(38)
Adam Shostack, Bruce Schneier, Breaking up is hard to do: modeling security threats for smart cards WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology. pp. 19- 19 ,(1999)
Bennet S. Yee, Using Secure Coprocessors ,(1994)
Denis Flandre, Amaury Nève, Jean-Jacques Quisquater, Feasibility of smart cards in silicon-on-insulator (SOI) technology WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology. pp. 1- 1 ,(1999)
Bill Horne, Lesley Matheson, Casey Sheehan, Robert E. Tarjan, Dynamic Self-Checking Techniques for Improved Tamper Resistance computer and communications security. pp. 141- 159 ,(2001) , 10.1007/3-540-47870-1_9
Jack Davidson, John Knight, Jonathan Hill, Chenxi Wang, Software Tamper Resistance: Obstructing Static Analysis of Programs University of Virginia. ,(2000)
Markus G. Kuhn, Oliver Kömmerling, Design principles for tamper-resistant smartcard processors WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology. pp. 2- 2 ,(1999)
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)