共 12 条
[1]
[Anonymous], 2008, P INT WORKSH CYB PHY
[2]
Armknecht F., 2013, ACM CCS, P1, DOI 10.1145/2508859.2516650
[3]
Castelluccia C, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P400
[4]
Kwon C, 2013, IEEE DECIS CONTR P, P188, DOI 10.1109/CDC.2013.6759880
[5]
Lee-Thorp A., 2010, Attestation in trusted computing: Challenges and potential solutions, V31
[6]
VIPER: Verifying the Integrity of PERipherals' Firmware
[J].
PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11),
2011,
:3-16
[7]
Menon PP, 2013, IEEE DECIS CONTR P, P2852, DOI 10.1109/CDC.2013.6760316
[8]
Mo Y., 2013, DETECTING INTEGRITY, P1
[9]
Mo YL, 2013, IEEE DECIS CONTR P, P6085, DOI 10.1109/CDC.2013.6760851
[10]
Parno B., 2011, SPRINGER BRIEFS COMP, V10