Защита встроенных систем на основе подхода «Симбионт»
Молодежный научно-технический вестник # 04, апрель 2015
УДК: 003.26.7 004.9
авторы: Кондратюк П. А., Попко К. С.
1. Ang C., Stolfo S.J. Defending Embedded Systems with Software Symbiotes. Available at: http://ids.cs.columbia.edu/sites/default/files/paper_2.pdf, accessed 27.12.14. 2. Chang, H., Atallah, M. J. Protecting software code by guards. Available at: https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2001-49.pdf, accessed 27.12.14. 3. Ang C., Stolfo S.J. Symbiotes and Defensive Mutualism: Moving Target Defense. Available at: http://ids.cs.columbia.edu/sites/default/files/Symbiote-Moving-Target-Defense_2011_2.pdf, accessed 27.12.14. 4. Choi C. Q. Embedded Anti-Malware Defends Against Cisco IP Phone Hack. Available at: http://spectrum.ieee.org/telecom/security/embedded-antimalware-defends-against-cisco-ip-phone-hack, accessed 27.12.14. 5. Janus M. Heads of the Hydra. Malware for Network Devices. Available at: http://securelist.com/analysis/36396/heads-of-the-hydra-malware-for-network-devices/, accessed 27.12.14.
|