Ordered Merkle Tree - a versatile data-structure for security kernels
<p>Hidden undesired functionality is an unavoidable reality in any complex hardware or software component. Undesired functionality deliberately introduced Trojan horses or accidentally introduced bugsin any component of a system can be exploited by attackers to exert control over the system. T...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en |
Published: |
MSSTATE
2013
|
Subjects: | |
Online Access: | http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ |