Login / Signup
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.
Matthias Neugschwandtner
Collin Mulliner
William K. Robertson
Engin Kirda
Published in:
TRUST (2016)
Keyphrases
</>
lightweight
embedded devices
integrity checking
integrity constraints
embedded systems
deductive databases
mobile devices
constraint logic programming
hard and soft constraints
data storage
wireless sensor networks
limited memory
flash memory
mobile commerce
logic programming
programming language
data streams