Mobile Phones as Computing Devices: The Viruses are Coming!, IEEE Pervasive Computing, vol.3, issue.4, pp.11-15, 2004. ,
DOI : 10.1109/MPRV.2004.21
Implementing an untrusted operating system on trusted hardware, SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.178-192, 2003. ,
Architectural support for copy and tamper resistant software, ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pp.168-177, 2000. ,
DOI : 10.1145/356989.357005
Design and implementation of the aegis single-chip secure processor using physical random functions, ISCA '05: Proceedings of the 32nd Annual International Symposium on Computer Architecture, pp.25-36, 2005. ,
Aegis: architecture for tamper-evident and tamper-resistant processing, ICS '03: Proceedings of the 17th annual international conference on Supercomputing, pp.160-171, 2003. ,
Efficient memory integrity verification and encryption for secure processors, MICRO 36: Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture, p.339, 2003. ,
Hmac: Keyed-hashing for message authentification, 1997. ,
DOI : 10.17487/rfc2104
Protocols for public key cryptography, IEEE Symposium on Security and Privacy, pp.122-134, 1980. ,
Security Engineering: A Guide to Building Dependable Distributed Systems, 2001. ,
Reconfigurable security support for embedded systems, HICSS '06: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), pp.250-251, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00089406