منابع مشابه
Embedded Linux Integrity
Linux is in widespread use in embedded devices, but these devices typically lack critical security features found in higher-end Linux systems. They typically do not have any way to validate their firmware, they do not have hardware roots of trust for trusted or secure boot, they do not have provisions for physical presence, to protect firmware from remote modification, and they do not have secu...
متن کاملProcess-Embedded Data Integrity
Despite the established theory and the history of the practical use of integrity rules, data quality problems, which should be solvable using data integrity rules, persist in organizations. One effective mechanism to solve this problem is to embed data integrity in a continuous data quality improvement process. The result is an iterative data quality improvement process as data integrity rules ...
متن کاملIntegrity and access control in untrusted content distribution networks
A content distribution network (CDN) makes a publisher’s content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the C...
متن کاملemittance control in high power linacs
چکیده این پایان نامه به بررسی اثر سیم پیچ مغناطیسی و کاوه یِ خوشه گر با بسامد رادیویی بر هاله و بیرونگراییِ باریکه هایِ پیوسته و خوشه ایِ ذرات باردار در شتابدهنده های خطیِ یونی، پروتونی با جریان بالا می پردازد و راه حل هایی برای بهینه نگهداشتن این کمیتها ارایه می دهد. بیرونگرایی یکی از کمیتهای اساسی باریکه هایِ ذرات باردار در شتابدهنده ها است که تاثیر قابل توجهی بر قیمت، هزینه و کاراییِ هر شتابدهند...
OEI: Operation Execution Integrity for Embedded Devices
We formulate a new security property, called “Operation Execution Integrity” or OEI, tailored for embedded devices. Inspired by the operation-oriented design of embedded programs and considering the limited hardware capabilities of embedded devices, OEI attestation enables selective and practical verification of both control-flow integrity and critical-variable integrity for an operation being ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Security & Privacy
سال: 2013
ISSN: 1540-7993
DOI: 10.1109/msp.2013.61