Login / Signup

Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation.

Raghunathan SrinivasanPartha DasguptaTushar GohadAmiya Bhattacharya
Published in: ICISS (2010)
Keyphrases
  • source code
  • software systems
  • legacy systems
  • trusted computing
  • databases
  • power consumption
  • data flow
  • legacy software