Login / Signup
Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation.
Raghunathan Srinivasan
Partha Dasgupta
Tushar Gohad
Amiya Bhattacharya
Published in:
ICISS (2010)
Keyphrases
</>
source code
software systems
legacy systems
trusted computing
databases
power consumption
data flow
legacy software