ILP Security Optimization Method for Embedded Systems with Timing Constraints.

Zhi Chen,Meikang Qiu,Lei Zhang,Fei Hu,Senlin Zhang
DOI: https://doi.org/10.1145/2179298.2179340
2011-01-01
Abstract:research-article Share on ILP security optimization method for embedded systems with timing constraints Authors: Zhi Chen View Profile , Meikang Qiu View Profile , Lei Zhang Search about this author , Fei Hu View Profile , Lei Zhang View Profile Authors Info & Claims CSIIRW '11: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence ResearchOctober 2011 Article No.: 38Pages 1https://doi.org/10.1145/2179298.2179340Online:12 October 2011Publication History 0citation86DownloadsMetricsTotal Citations0Total Downloads86Last 12 Months0Last 6 weeks0 Get Citation AlertsNew Citation Alert added!This alert has been successfully added and will be sent to:You will be notified whenever a record that you have chosen has been cited.To manage your alert preferences, click on the button below.Manage my AlertsNew Citation Alert!Please log in to your account Save to BinderSave to BinderCreate a New BinderNameCancelCreateExport CitationPublisher SiteGet Access
What problem does this paper attempt to address?