Specifying and Verifying Hardware for Tamper-Resistant Software
0 Comments
by David Lie, John Mitchell, Chandramohan A. Thekkath and Mark A. Horowitz
Reference:
David Lie, John Mitchell, Chandramohan A. Thekkath and Mark A. Horowitz, “Specifying and Verifying Hardware for Tamper-Resistant Software”, In Proceedings of the 24th IEEE Symposium on Security and Privacy, 2003.
Bibtex Entry:
@inproceedings{lie:oakland2003, author = "Lie, David and Mitchell, John and Thekkath, Chandramohan A. and Horowitz, Mark A.", title = "Specifying and Verifying Hardware for Tamper-Resistant Software", booktitle = "Proceedings of the 24th {IEEE} Symposium on Security and Privacy", month = "May", year = "2003", url = "https://security.csl.toronto.edu/wp-content/uploads/2018/06/lie-oakland2003.pdf", note = "(Acceptance: 19/131, 19\%; \textbf{148 citations})", citations = "148", gsid = "8280169225413675106" }