Citations
The paper
has been cited by the following works.
- J. Tepandi.
Reflection as a mechanism for software integrity verification.
ACM Computing Reviews, December 2000.
- S. Fischmeister, G. Hagleitner, and W. Pree.
Symbolon — a novel concept for secure e-commerce.
1st IFIP Conference on E-Commerce, E-Business, E-Government, I3E
2001, 74:603–616, 2001.
- Sebastian
Fischmeister, Günther Hagleitner, Wolfgang Pree, and Gustav Pomberger.
Symbolon—a novel concept for secure e-commerce.
In Proceedings of the IFIP 1st I3E e-Commerce, e-Business, e-Government
Conference, pages 603–616. IFIP, Kluwer, October 2001.
- Eric Yu En Lue.
Intelligent networks
for smart and dumb appliances.
Available online: http://www.yuenlue.com/Literature/INSDA.2a.pdf, September
2001.
- David Mussington.
Concepts
for enhancing critical infrastructure protection : relating Y2K to CIP
research and development.
RAND, Santa Monica, CA, USA, 2002.
- Mike Jochen, Lisa
Marvel, and Lori Pollock.
A
framework for tamper detection marking of mobile applications.
In International Symposium on Software Reliability Engineering
(ISSRE), November 2003.
- Mike Jochen, Lori
Pollock, and Lisa Marvel.
Tamper detection marking for object files.
In Military Communications Conference, MILCOM, pages 747–751,
October 2003.
- Mike Jochen, Lori
Pollock, and Lisa Marvel.
Zero footprint tamper detection for object files.
In Proceedings of the Collaborative Technology Alliances Communications
& Networks Alliance (CTA C&N) Annual Symposium, April 2003.
- L. Catuogno and
I. Visconti.
An architecture for kernel-level verification of executables at run time.
Computer Journal, 47(5):511–526, September 2004.
(doi:10.1093/comjnl/47.5.511)
- John J. Dorak, Jr.,
Stephen B. Cagle, and Richard L. Spagna.
Method
and system for secure debugging of a secure software module.
United States Patent 6,742,177, May 2004.
Assignee: International Business Machines Corporation (Armonk, NY).
- Paul A. Cronce.
Method
for runtime code integrity validation using code block checksums.
United States Patent 6,880,149, April 2005.
Assignee: Pace Anti-Piracy (San Jose, CA).
- A. Seshadri,
M. Luk, A. Perrig, L. Van Doorn, and P. Khosla.
Scuba: Secure code update by attestation in sensor networks.
In WiSE 2006 — Proceedings of the 5th ACM Workshop on Wireless
Security, volume 2006, pages 85–94, 2006.
- Arvind Seshadri,
Mark Luk, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla.
SCUBA: Secure code update by attestation in sensor networks.
In WiSe '06: Proceedings of the 5th ACM workshop on Wireless
Security, pages 85–94, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1161289.1161306)
- Y. Yang, X. Wang, S. Zhu,
and G. Cao.
Distributed software-based attestation for node compromise detection in sensor
networks.
In Proceedings of the IEEE Symposium on Reliable Distributed
Systems, pages 219–228, 2007.
(doi:10.1109/SRDS.2007.4365698)
- T. AbuHmed, N. Nyamaa,
and D. Nyang.
Software-based remote code attestation in wireless sensor network.
In GLOBECOM - IEEE Global Telecommunications Conference, 2009.
(doi:10.1109/GLOCOM.2009.5425280)
- X. Lin.
Cat: Building couples to early detect node compromise attack in wireless sensor
networks.
In GLOBECOM - IEEE Global Telecommunications Conference, 2009.
(doi:10.1109/GLOCOM.2009.5425922)
- S. Yi, J. Lee, H. Min,
Y. Cho, and J. Hong.
Yasic: Yet-another software integrity checker for security-critical wireless
sensor networks.
In 24th International Conference on Computers and Their Applications
2009, CATA 2009, pages 117–121, 2009.
- B. Parno, J.M. McCune, and
A. Perrig.
Bootstrapping trust in commodity computers.
In Proceedings - IEEE Symposium on Security and Privacy, pages
414–429, 2010.
(doi:10.1109/SP.2010.32)
- J.M. McCune and
A. Perrig.
VIPER: Verifying the integrity of peripherals' firmware.
In Proceedings of the ACM Conference on Computer and Communications
Security, pages 3–16, 2011.
(doi:10.1145/2046707.2046711)
- T. Moyer, T. Jaeger, and
P. McDaniel.
Scalable integrity-guaranteed AJAX.
Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 7235
LNCS:1–19, 2012.
(doi:10.1007/978-3-642-29253-8_1)
- Yannick
Teglia and Pierre-Yvan Liardet.
Statistical
control of the integrity of a program.
United States Patent 8,239,833, August 2012.
Assignee: STMicroelectronics S.A. (Montrouge, FR).
- F. Blanchet-Sadri, B. Chen, and S. Munteanu.
A note on constructing infinite binary words with polynomial subword
complexity.
RAIRO - Theoretical Informatics and Applications, 47(2):171–180,
2013.
- Varadarajan
Sridhar, Ravi G. Amur, and Korrapati Kalyane Rao.
System
and method for automated safe reprogramming of software radios.
United States Patent 8,347,108, January 2013.
Assignee: Satyam Computer Services Limited of Mayfair Centre (Secunderabad,
IN).
- Ashok Vadekar
and Brian Neill.
Retrofitting
authentication onto firmware.
United States Patent 8,566,791, October 2013.
Assignee: BlackBerry Limited (Waterloo, Ontario, CA).
- Y. Li, Y. Cheng,
V. Gligor, and A. Perrig.
Establishing software-only root of trust on embedded systems: Facts and
fiction.
23rd International Workshop on Security Protocols, 2015,
9379:50–68, 2015.
(doi:10.1007/978-3-319-26096-9_7)
- Adrian Perrig,
Pradeep Khosla, Arvind Seshadri, Mark Luk, and Leendert van Doorn.
Verifying
integrity and guaranteeing execution of code on untrusted computer
platform.
United States Patent 9,177,153, November 2015.
Assignee: Carnegie Mellon University (Pittsburg, PA).
- O. Stecklina,
P. Langendörfer, F. Vater, T. Kranz, and G. Leander.
Intrinsic code attestation by instruction chaining for embedded devices.
11th International Conference Security and Privacy in Communication
Networks, SecureComm 2015, 164:97–115, 2015.
(doi:10.1007/978-3-319-28865-9_6)
- Daniel
Willis and Gordon Freedman.
Method
and system supporting audited reporting of advertising impressions from video
games.
United States Patent 9,180,369, November 2015.
Assignee: Google Inc. (Mountain View, CA).
- A. Viticchié, C. Basile, A. Avancini, M. Ceccato,
B. Abrath, and B. Coppens.
Reactive attestation: Automatic detection and reaction to software tampering
attacks.
In 2nd International Workshop on Software PROtection, SPRO 2016,
pages 73–84. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2995306.2995315)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.