Sciweavers

3516 search results - page 283 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
LCTRTS
2009
Springer
15 years 10 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
ACSAC
2001
IEEE
15 years 7 months ago
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...
Albert Levi, Çetin Kaya Koç
SIGUCCS
2003
ACM
15 years 9 months ago
Putting OSX in an open access lab: (or "The Joy of X")
This paper discusses the challenges of putting Apple Macintosh OSX into open access and computer lab environments. Categories and Subject Descriptors K.6.4 [Management of Computin...
David L. R. Houston
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
15 years 5 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
RTCSA
2006
IEEE
15 years 10 months ago
Jitter Evaluation of Real-Time Control Systems
The real-time implementation of a controller typically introduces artefacts like delay and jitters that have not been considered at the design stage. As a consequence, the system ...
Manuel Lluesma, Anton Cervin, Patricia Balbastre, ...