Journal of Engineering and Applied Sciences
Year:
2019
Volume:
14
Issue:
13
Page No.
4435 - 4441
References
Asokan, N., J. Mantyla and R. Serafat, 2018. Method and device for verifying the integrity of platform software of an electronic device. USPTO. Washington, DC., USA. https://patents.google.com/patent/US9881150B2/en
Cappaert, J. and B. Preneel, 2010. A general model for hiding control flow. Proceedings of the ACM 10th Annual International Workshop on Digital Rights Management (DRM '10), October 4, 2010, ACM, New York, USA., ISBN:978-1-4503-0091-9, pp: 35-42.
Chen, Y., R. Venkatesan, M. Cary, R. Pang and S. Sinha
et al., 2002. Oblivious hashing: A stealthy software integrity verification primitive. Proceedings of the 5th International Workshop on Information Hiding (IH’02), October 7-9, 2002, Springer, Noordwijkerhout, The Netherlands, ISBN:978-3-540-00421-9, pp: 400-414.
Graunke, G.L. and C.V. Rozas, 2000. Method and apparatus for integrity verification, authentication and secure linkage of software modules. Patent and Trademark Office, Washington, DC., USA. https://patents.google.com/patent/US6105137A/en
Kirovski, D., M. Drinic and M. Potkonjak, 2002. Enabling trusted software integrity. ACM. Sigplan Not., 37: 108-120.
Direct Link | Lindell, Y. and J. Katz, 2014. Introduction to Modern Cryptography. 2nd Edn., CRC Press, Boca Raton, Boca Raton, USA., ISBN:9781466570269, Pages: 583.
Paar, C. and J. Pelzl, 2009. Understanding Cryptography: A Textbook for Students and Practitioners. Springer, New York, USA., ISBN:978-3-642-44649-8, Pages: 367.
Spinellis, D., 2000. Reflection as a mechanism for software integrity verification. ACM. Trans. Inf. Syst. Sec., 3: 51-62.
Direct Link | Stallings, W., 2006. Cryptography and Network Security. 4th Edn., Prentice Hall, New Jersey, USA., ISBN-13: 9780131873162, Pages: 680.