期刊文献+

解析嵌入式系统的网络信息软件应用

在线阅读 下载PDF
导出
摘要 随着计算机技术不断发展,嵌入式系统在网络信息中应用广泛,嵌入式技术已成为计算机技术的重要分支之一,本文就嵌入式系统在网络信息软件中的应用进行了分析讨论。
作者 何正伟
出处 《信息系统工程》 2013年第3期102-102,155,共2页
  • 相关文献

参考文献2

二级参考文献10

  • 1Arora D,,Ravi S,Raghunathan A,et al.Secure Em-bedded Processing through Hardware-assisted Runtime Monitoring[].ProcACM/IEEE DesignAuto-mationand Test in Europe(DATE).2005
  • 2Collberg C S,Thomborson C.Watermarking,Tamper-proofing,and Obfuscation-tools for Software Protection[].IEEE Tans Software Eng.2002
  • 3Edward Suh G,JaeWook Lee,Srinivas Devadas.Se-cure Program Execution via Dynamic Information Flow Tracking. Technical Report,MIT LCS TR-912 . 2003
  • 4Kiriansky V,Bruening D,Amarasinghe S P.Secure Ex-ecution Via Program Shepherding[].Proceedings of theth USENIX Security Symposium.2002
  • 5Smith S,Weingart S.Building A High-performance Programmable Secure Coprocessor[].The International Journal of Computer and Telecommunications Networking.1999
  • 6Neville-neil G V.Programming Without A net[].ACM Queue:Tomorrow s Computing Today.2003
  • 7Arora D,Raghunathan A,Ravi S.Enhancing Security Through Hardware-assisted Run-time Validation of Program Data Properties[].Proc ACM/IEEE Inter-national Conference on Hardware Software Co-design and System Synthesis(CODES+ISSS).2005
  • 8Ravi,S,Raghunathan,A,Kocher,P,Hattangady,S.Security in Embedded Systems:Design Challenges[].ACMTransactions on Embedded Computing Systems.2004
  • 9Shuo Chen,,Zb ign iew Kalbarczyk,Jun Xu,RavishankarK Iyer.A Data-D riven F in ite State Mach ine Model for Analyzing Security Vu lnerab ili-ties[].DSN.2003
  • 10HORNE B,MATHESON L,SHEEHAN C.Dynamic self-checkingtechniques for improved tamper resistance[].Proc of Security andPrivacy in Digital Rights Management.2001

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部