[PDF][PDF] Establishing Software Root of Trust Unconditionally.
VD Gligor, SLM Woo - NDSS, 2019 - ndss-symposium.org
Establishing Software Root of Trust Unconditionally Page 1 Establishing Software Root of
Trust Unconditionally (or, a First Rest Stop on the Never-Ending Road to Provable Security) …
Trust Unconditionally (or, a First Rest Stop on the Never-Ending Road to Provable Security) …
PSOS revisited
PG Neumann, RJ Feiertag - 19th Annual Computer Security …, 2003 - ieeexplore.ieee.org
We provide a retrospective view of the design of SRI's Provably Secure Operating System
(PSOS), a formally specified tagged-capability hierarchical system architecture. It examines …
(PSOS), a formally specified tagged-capability hierarchical system architecture. It examines …
[图书][B] Modeling and optimization of parallel and distributed embedded systems
This book introduces the state-of-the-art in research in parallel and distributed embedded
systems, which have been enabled by developments in silicon technology, micro-electro …
systems, which have been enabled by developments in silicon technology, micro-electro …
An introductory textbook on cyber-physical systems
We introduce a textbook that strives to identify and introduce the durable intellectual ideas of
embedded systems as a technology and as a subject of study. The emphasis is on …
embedded systems as a technology and as a subject of study. The emphasis is on …
Lessons learned in game development for crowdsourced software formal verification
D Dean, S Gaurino, L Eusebi, A Keplinger… - 2015 USENIX Summit …, 2015 - usenix.org
The history of formal methods and computer security research is long and intertwined.
Program logics that were in theory capable of proving security properties of software were …
Program logics that were in theory capable of proving security properties of software were …
Sharpening your tools: Updating bulk_extractor for the 2020s
S Garfinkel, J Stewart - Queue, 2023 - dl.acm.org
This article presents our experience updating the high-performance Digital forensics tool BE
(bulk_extractor) a decade after its initial release. Between 2018 and 2022, we updated the …
(bulk_extractor) a decade after its initial release. Between 2018 and 2022, we updated the …
Introduction to Embedded Systems
AL Edward, SA Seshia - 2017 - dlib.hust.edu.vn
The most visible use of computers and software is processing information for human
consumption. The vast majority of computers in use, however, are much less visible. They …
consumption. The vast majority of computers in use, however, are much less visible. They …
Towards Mechatronics Approach of System Design, Verification and Validation for Autonomous Vehicles
Modern-day autonomous vehicles are increasingly becoming complex multidisciplinary
systems composed of mechanical, electrical, electronic, computing and information …
systems composed of mechanical, electrical, electronic, computing and information …
A further note on the confinement problem
WE Boebert, RY Kain - 1996 30th Annual International …, 1996 - ieeexplore.ieee.org
“Confinement”, in computer systems, is the ability to limit the amount of damage that can be
done by malicious or malfunctioning software. Confinement is a requirement when either …
done by malicious or malfunctioning software. Confinement is a requirement when either …
[图书][B] Verifiable computer security and hardware: Issues
WD Young - 1991 - cs.utexas.edu
This report explores the influences of hardware on verifiable secure system design and
envisions a mutually beneficial collaboration between the hardware verification and security …
envisions a mutually beneficial collaboration between the hardware verification and security …