Sciweavers

184 search results - page 4 / 37
» Secure Software Delivery and Installation in Embedded System...
Sort
View
ICSM
2000
IEEE
13 years 10 months ago
A Deployment System for Pervasive Computing
Software has for a long time been used for controlling different systems. Today, there is a trend towards integrating software into consumer electronics, home appliances, cars etc...
Jesper Andersson
DRMTICS
2005
Springer
13 years 11 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
CCS
2010
ACM
13 years 4 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
ISI
2005
Springer
13 years 11 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
HOTOS
1997
IEEE
13 years 10 months ago
Operating Systems for Component Software Environments
Although component software has emerged as one of the most significant and commercially successful technologies of the past few years, few operating systems are designed to host a...
Noah Mendelsohn