[PDF][PDF] Establishing Software Root of Trust Unconditionally.

VD Gligor, SLM Woo - NDSS, 2019 - ndss-symposium.org
Establishing Software Root of Trust Unconditionally Page 1 Establishing Software Root of
Trust Unconditionally (or, a First Rest Stop on the Never-Ending Road to Provable Security) …

PSOS revisited

PG Neumann, RJ Feiertag - 19th Annual Computer Security …, 2003 - ieeexplore.ieee.org
We provide a retrospective view of the design of SRI's Provably Secure Operating System
(PSOS), a formally specified tagged-capability hierarchical system architecture. It examines …

[图书][B] Modeling and optimization of parallel and distributed embedded systems

A Munir, A Gordon-Ross, S Ranka - 2016 - books.google.com
This book introduces the state-of-the-art in research in parallel and distributed embedded
systems, which have been enabled by developments in silicon technology, micro-electro …

An introductory textbook on cyber-physical systems

EA Lee, SA Seshia - Proceedings of the 2010 Workshop on Embedded …, 2010 - dl.acm.org
We introduce a textbook that strives to identify and introduce the durable intellectual ideas of
embedded systems as a technology and as a subject of study. The emphasis is on …

Lessons learned in game development for crowdsourced software formal verification

D Dean, S Gaurino, L Eusebi, A Keplinger… - 2015 USENIX Summit …, 2015 - usenix.org
The history of formal methods and computer security research is long and intertwined.
Program logics that were in theory capable of proving security properties of software were …

Sharpening your tools: Updating bulk_extractor for the 2020s

S Garfinkel, J Stewart - Queue, 2023 - dl.acm.org
This article presents our experience updating the high-performance Digital forensics tool BE
(bulk_extractor) a decade after its initial release. Between 2018 and 2022, we updated the …

Introduction to Embedded Systems

AL Edward, SA Seshia - 2017 - dlib.hust.edu.vn
The most visible use of computers and software is processing information for human
consumption. The vast majority of computers in use, however, are much less visible. They …

Towards Mechatronics Approach of System Design, Verification and Validation for Autonomous Vehicles

C Samak, T Samak, V Krovi - 2023 IEEE/ASME International …, 2023 - ieeexplore.ieee.org
Modern-day autonomous vehicles are increasingly becoming complex multidisciplinary
systems composed of mechanical, electrical, electronic, computing and information …

A further note on the confinement problem

WE Boebert, RY Kain - 1996 30th Annual International …, 1996 - ieeexplore.ieee.org
“Confinement”, in computer systems, is the ability to limit the amount of damage that can be
done by malicious or malfunctioning software. Confinement is a requirement when either …

[图书][B] Verifiable computer security and hardware: Issues

WD Young - 1991 - cs.utexas.edu
This report explores the influences of hardware on verifiable secure system design and
envisions a mutually beneficial collaboration between the hardware verification and security …