임베디드시스템 설계에서의 보안 기술

  • Published : 2006.05.01

Abstract

Keywords

References

  1. W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall,1998
  2. B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, 1996.
  3. Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, "Security as a New Dimension in Embedded System Design", ACM, pp. 753-760, June 2004
  4. Common Vulnerabilities and Exposures. (http://cve.mitre.org/)
  5. S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper Resistance Mechanisms for Secure Embedded Systems," in Proc. Int. Coni VLSI Design, Jan. 2004
  6. O. Kommerling and M. G. Kuhn, "Design principles for tamper-resistant smartcard processors," in Proc. USENIX Workshop on Smartcard Technology (Smartcard '99),pp. 9-20, May 1999
  7. P. Kocher, J. Jaffe, and B. Jun, Introduction to differential power analysis and related attacks. (http://www.cryptography.com/resources/whitepapers/)
  8. D. Brumley and D. Boneh, "Remote Timing Attacks Are Practical ," in Proc. 12th USENIX Security Symp; pp. 1-14, Aug. 2003
  9. D. Boneh, R. DeMillo, and R. Lipton, "On the importance of checking cryptographic protocols for faults" , in Proc. of Eurocrypt'97, pp. 37-51, 1997
  10. S. Govindavajhala and A. W. Appel, "Using Memory Errors to Attack a Virtual Machine," in Proc. IEEE Symposium on Security and Privacy, pp. 154-165, May 2003
  11. K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic analysis: Concrete results," in Proc. Cryptographic Hardware and Embedded Systems, pp. 251-261, 2001 https://doi.org/10.1007/3-540-44709-1_21
  12. G. Hoglund and G. McGraw, Exploiting Software: How to Break Code http://www.exploitingsoftware.com) , Addison- Wesley, 2004
  13. IPSec Working Group. http://www.ietf.org/html.charters/ipsec - charter .html
  14. SSL 3.0 Specification. http://wp.netscape.com/eng/ssl31
  15. Biometrics and Network Security. Prentice Hall PTR, 2003
  16. OpenIPMP. http://www.openipmp.org
  17. Internet Streaming Media Alliance. httpi/www.isma.tv/horne
  18. Discretix Technologies Ltd. (http://www.discretix.com)
  19. B. Yee, Using Secure Co-processors. PhD thesis, Carnegie Mellon University, 1994
  20. A. Arbaugh, D. 1. Farber, and 1. M. Smith, "A Secure and Reliable BootStrap Architecture," in Proc. of IEEE Symposium on Security and Privacy, pp. 6571, May 1997
  21. D. Lie, C. A. Thekkath, and M. Horowitz, "Implementing an untrusted operating system on trusted hardware," in Proc. ACM Symposium on Operating Systems Principles, pp. 178-192, Oct. 2003
  22. G. C. Necula and P. Lee, "Proof-Carrying Code," Tech. Rep. MU-CS-96165,Carnegie Mellon University, Nov. 1996
  23. S. Ravi, A. Raghunathan, and N. Potlapally, u Securing wireless data: System architecture challenges," in Proc. Inti. Symp. System Synthesis, pp. 195-200, October 2002
  24. Next-Generation Secure Computing Base (NGSCB). Microsoft Inc. (http://www.microsoft.com/resources/ngscb/productinf o.mspx)
  25. Trusted Computing Group. (https:/www.trustedcomputinggroup.org/horne)