Sciweavers

184 search results - page 11 / 37
» Secure Software Delivery and Installation in Embedded System...
Sort
View
SAFECOMP
1998
Springer
15 years 8 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
ICICS
2005
Springer
15 years 9 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
SIES
2009
IEEE
15 years 10 months ago
A flexible design flow for software IP binding in commodity FPGA
— Software intellectual property (SWIP) is a critical component of increasingly complex FPGA based system on chip (SOC) designs. As a result, developers want to ensure that their...
Michael Gora, Abhranil Maiti, Patrick Schaumont
IASTEDSE
2004
15 years 5 months ago
Security and reliability challenges in component-based software for consumer devices
Consumer devices have domain specific constraints imposed by end-users, device manufacturers and service providers. These constraints focus on the need for security and reliabilit...
Stefano Campadello, Ronan MacLaverty, Titos Sarida...
ACSAC
2003
IEEE
15 years 9 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella