×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [7]
软件研究所 [7]
湖南大学 [1]
内容类型
会议论文 [11]
期刊论文 [4]
发表日期
2019 [1]
2018 [2]
2017 [1]
2016 [1]
2015 [1]
2013 [3]
更多...
学科主题
计算机科学技术基础学... [3]
计算机系统结构::计... [3]
计算机软件::操作系... [3]
计算机软件::程序设... [3]
计算机软件::编译系... [3]
Computer S... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
HCIC: Hardware-Assisted Control-Flow Integrity Checking
期刊论文
IEEE Internet of Things Journal, 2019, 卷号: Vol.6 No.1, 页码: 458-471
作者:
Zhang, JL
;
Qi, BH
;
Qin, Z
;
Qu, G
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/12/13
Runtime
Cryptography
Internet of Things
Malware
Programming
Resists
Code reuse attacks (CRAs)
control flow integrity (CFI)
hardware-assisted security
physical unclonable function (PUF)
A novel security validation in embedded system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Li, L.
;
Du, P.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Hardware
Hardware security
Intrusion detection
Program compilers
execution behavior
Experimental analysis
Hardware-assisted
Memory access validations
Performance penalties
Response mechanisms
secure tag
Software vulnerabilities
Embedded systems
Hardware-assisted integrity monitor based on lightweight hash function
期刊论文
IEICE ELECTRONICS EXPRESS, 2018, 卷号: 15
作者:
Du, Pei
;
Wang, Xiang
;
Wang, Weike
;
Li, Lin
;
Xia, Tongsheng
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
embedded system security
integrity monitoring
lightweight hash function
property information
A Novel Security Validation in Embedded System
会议论文
PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017-01-01
作者:
Wang, Xiang
;
Xu, Bin
;
Wang, Weike
;
Li, Lin
;
Du, Pei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
secure tag
memory access validation
embedded systems
hardware-assisted
execution behavior
intrusion detection
Hardware-Assisted System for Program Execution Security of SOC
会议论文
3rd Annual International Conference on Information Technology and Applications (ITA), Hangzhou, PEOPLES R CHINA, 2016-01-01
作者:
Wang, Xiang
;
Pang, Shu-Song
;
Wang, Wei-Ke
;
Zhao, Zong-Min
;
Zhou, Cheng
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Hardware-Assisted Monitoring for Code Security in Embedded System
会议论文
12th IEEE Int Conf Ubiquitous Intelligence & Comp/12th IEEE Int Conf Autonom & Trusted Comp/15th IEEE Int Conf Scalable Comp & Commun & Associated Workshops/IEEE Int Conf Cloud & Big Data Comp/IEEE Int Conf Internet People, Beijing, PEOPLES R CHINA, 2015-08-10
作者:
Wang, Xiang
;
Shen, Quanneng
;
Du, Pei
;
Zhang, Rong
;
Wang, Weike
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/06
hardware-assisted
code protection
lightweight
security module
Defending return-oriented programming based on virtualization techniques
期刊论文
Security and Communication Networks, 2013, 卷号: Volume 6, 期号: Issue 10, 页码: 1236-1249
Xiaoqi Jia
;
Rui Wang
;
Jun Jiang
;
Shengzhi Zhang
;
Peng Liu
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2013/04/11
return-oriented programming
hypervisor-based security
hardware-assisted virtualization
HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data
会议论文
7th IEEE International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, JUN 18-20, 2013
Ding, Baozeng
;
He, Yeping
;
Wu, Yanjun
;
Lin, Yuqi
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2014/12/16
virtualization
hypervisor introspection
non-control data
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
会议论文
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2013/12/02
Sandbox
Hypervisor based security
Hardware assisted virtualization
Cloud computing
improving flask implementation using hardware assisted in-vm isolation
会议论文
27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4, 2012 - June 6, 2012
Ding Baozeng
;
Yao Fufeng
;
Wu Yanjun
;
He Yeping
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/09/22
Computer hardware
Hardware
Managers
Security of data
Separation
©版权所有 ©2017 CSpace - Powered by
CSpace