- Dimitrios N. Serpanos, Wayne H. Wolf:
Proceedings of the 4th Workshop on Embedded Systems Security, WESS 2009, Grenoble, France, October 15, 2009. ACM 2009, ISBN 978-1-60558-700-4
- Philipp Grabher, Johann Großschädl, Dan Page:
Non-deterministic processors: FPGA-based analysis of area, performance and security.
- Thomas Winkler, Bernhard Rinner:
Applications of trusted computing in pervasive smart camera networks.
- Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis of the split mask countermeasure for embedded systems.
- Antonio Vincenzo Taddeo, Pierpaolo Marcon, Alberto Ferrante:
Negotiation of security services: a multi-criteria decision approach.
- Jörg Brauer, Bastian Schlich, Thomas Reinbacher, Stefan Kowalewski:
Stack bounds analysis for microcontroller assembly code.
- Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi:
PIFT: efficient dynamic information flow tracking using secure page allocation.
- Ahmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Automatic detection of fault attack and countermeasures.
- Ilya Kizhvatov:
Side channel analysis of AVR XMEGA crypto engine.
- Miroslav Knezevic, Ingrid Verbauwhede:
Hardware evaluation of the Luffa hash family.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.