VIPER: verifying the integrity of PERipherals' firmware.
Yanlin LiJonathan M. McCuneAdrian PerrigPublished in: CCS (2011)
Keyphrases
- operating system
- power consumption
- low power
- integrity checking
- model checking
- integrity constraints
- computer systems
- database integrity
- real world
- high assurance
- image processing
- real time
- database systems
- input output
- multi agent
- trusted computing
- ibm zenterprise
- machine learning
- database
- highly modular
- fragile watermarking scheme