참고문헌
- Philip Koopman, 'Embedded System Security,' EMDEDDED COMPUITNG, pp.95-97, July 2004
- William A. Arbaugh, Leedert van Doorn, 'Embedded Security: Challenges and Concerns', IEEE Security, pp. 40-41,2001
- W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall, 1998
- B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, 1996
- Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi, 'Security as a New Dimension in Embedded System Design', ACM, pp. 753-760, June 2004
- S. Ravi, A. Raghunathan, and S. Chakradhar, 'Tamper Resistance Mechanisms for Secure Embedded Systems,' in Proc. Int. Conf. VISI Design, Jan. 2004
- Common Vulnerabilities and Exposures. (http//cve.mitre.org/)
- Virus Information. Computer Security Resource Center, National Institute of Standards and Technology (http://csrc.nist.gov/virus/)
- G. Hoglund and G. McGraw, Exploiting Software: How to Break Code http://www.exploitingsoftware.com), Addison-Wesley, 2004
- O. Kommerling and M. G. Kuhn, 'Design principles for tamper-resistant smartcard processors,' in Proc, USENIX Workshop on Smartcard Technology (Smartcard '99), pp. 9-20, May 1999
- P. Kocher, J. Jaffe, and B. Jun, Introduction to differential power analysis and related attacks. (http://www.cryptography.com/resources/whitepapers/)
- D. Brumley and D. Boneh, 'Remote Timing Attacks Are Practical,' in Proc, 12th USENIX Security Symp., pp. 1-14, Aug. 2003
- D. Boneh, R. DeMillo, and R. Lipton, 'On the importance of checking cryptographic protocols for faults', in Proc, of Eurocrypt '97,pp. 37-51, 1997
- S. Govindavajhala and A. W. Appel, 'Using Memory Errors to Attack a Virtual Machine,' in Proc. IEEE Symposium on Security and Privacy, pp. 154-165, May 2003
- K. Gandolfi, C. Mourtel, and F. Olivier, 'Electromagnetic analysis: Concrete results,' in Proc. Cryptographic Hardware and Embedded Systems, pp. 251-261, 2001
- IPSec Working Group. http://www.ietf.org/html.charters/ipsec-charter.html
- SSL 3.0 Specification. http://wp.netscape.com/eng/ssl31/
- Biometrics and Network Security. Prentice Hall PTR, 2003
- OpenIPMP. http://www.openipmp.org
- Internet Streaming Media Alliance. http://www.isma.tv/home
- Discretix Technologies Ltd. (http://www.discretix.com)
- B. Yee, Using Secure Co-processors. PhD thesis, Carnegie Mellon University, 1994
- A. Arbaugh, D.J. Farber, and J. M. Smith, 'A Secure and Reliable BootStrap Architecture,' in Proc, of IEEE Symposium on Security and Privacy, pp. 65-71, May 1997
- D. Lie, C. A. Thekkath, and M. Horowitz, 'Implementing an untrusted operating system on trusted hardware,' in Proc, ACM Symposium on Operating Systems Principles, pp. 178-192, Oct. 2003
- G. C. Necula and P. Lee, 'Proof-Carrying Code,' Tech. Rep. MU-CS-96-165, Carnegie Mellon University, Nov. 1996
- S. Ravi, A. Raghunathan, and N. Potlapally, 'Securing wireless data: System architecture challenges,' in Proc, Intl. Symp. System Synthesis, pp. 195-200, October 2002
- Next-Generation Secure Computing Base(NGSCB). Microsoft Inc. (http://www.microsoft.com/resources/ngscb/productinfo.mspx)
- Trusted Computing Group. (https://www.trustedcomputinggroup.org/home)
- R. York, A New Foundation for CPU Systems Security. ARM Limited (http://www.arm.com/armtech/TrustZone?OpenDocument)