共 50 条
- [1] Compiling Java']Java for low-end embedded systems [J]. ACM SIGPLAN NOTICES, 2003, 38 (07) : 42 - 50
- [2] Secure Interrupts on Low-End Microcontrollers [J]. PROCEEDINGS OF THE 2014 IEEE 25TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2014), 2014, : 147 - 152
- [3] PISTIS: Trusted Computing Architecture for Low-end Embedded Systems [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3843 - 3860
- [4] Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 320 - 338
- [5] Java']Java bytecode compression for low-end embedded systems [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2000, 22 (03): : 471 - 489
- [6] PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in Low-End Embedded Systems [J]. 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2019,
- [7] VERIFY&REVIVE: Secure Detection and Recovery of Compromised Low-end Embedded Devices [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 717 - 732
- [8] FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems [J]. ACM TRANSACTIONS ON INTERNET OF THINGS, 2024, 5 (03):
- [9] Secure firmware update in embedded systems [J]. 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE-BERLIN), 2019, : 16 - 19
- [10] Continuous Speech Recognizer for Low-end Embedded Devices [J]. 2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 41 - 44