共 49 条
[1]
Malicious code detection for open firmware
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:403-412
[2]
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[3]
[Anonymous], SECURITY
[4]
[Anonymous], 2003, International conference on Supercomputing, ICS '03
[5]
[Anonymous], UCAMCLTR630
[6]
A secure and reliable bootstrap architecture
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:65-71
[7]
Atallah M.J., 2008, Proceedings of the 1st ACM workshop on Virtual machine security, P45
[8]
Wires on demand:: Run-time communication synthesis for reconfigurable computing
[J].
2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2,
2007,
:513-516
[9]
SECURE FPGA CONFIGURATION ARCHITECTURE PREVENTING SYSTEM DOWNGRADE
[J].
2008 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE AND LOGIC APPLICATIONS, VOLS 1 AND 2,
2008,
:317-+
[10]
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12