共 67 条
- [51] Trusted Execution Environment: What It Is, and What It Is Not [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 57 - 64
- [52] Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 437 - 455
- [56] Singh R., 2014, Int. J. Eng. Res. Appl, V4, P519
- [57] Sommerhalder M., 2023, Trends in Data Protection and Encryption Technologies, P83
- [58] Dynamic Security Analysis on Android: A Systematic Literature Review [J]. IEEE ACCESS, 2024, 12 : 57261 - 57287
- [59] Challenges and Opportunities for Hardware-Assisted Security Improvements in the Field [J]. PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022), 2022, : 90 - 95
- [60] CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks<bold> </bold> [J]. PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 711 - 723