Skip to content

Specifying and Verifying Hardware for Tamper-Resistant Software

by David Lie, John Mitchell, Chandramohan A. Thekkath and Mark A. Horowitz
Reference:
David Lie, John Mitchell, Chandramohan A. Thekkath and Mark A. Horowitz, “Specifying and Verifying Hardware for Tamper-Resistant Software”, In Proceedings of the 24th IEEE Symposium on Security and Privacy, 2003.
Bibtex Entry:
@inproceedings{lie:oakland2003,
    author = "Lie, David and Mitchell, John and Thekkath, Chandramohan A. and Horowitz, Mark A.",
    title = "Specifying and Verifying Hardware for Tamper-Resistant Software",
    booktitle = "Proceedings of the 24th {IEEE} Symposium on Security and Privacy",
    month = "May",
    year = "2003",
    url = "https://security.csl.toronto.edu/wp-content/uploads/2018/06/lie-oakland2003.pdf",
    note = "(Acceptance: 19/131, 19\%; \textbf{148 citations})",
    citations = "148",
    gsid = "8280169225413675106"
}