fun-size crypto nybles and bytes..for small systems
#2Sealed Forth
Cryptographically bind execution semantics of each forth word to the software and hardware configuration that came before it.
Trustworthy computing
- http://www3.cs.stonybrook.edu/~rob/teaching/cse409-fa11/notes/11-28-alin-tomescu.pdf
- http://www3.cs.stonybrook.edu/~rob/teaching/cse409-fa11/notes/11-28-luke-mladek.pdf
Trustworthy computing, continued (sealed storage), usable security
- http://www3.cs.stonybrook.edu/~rob/teaching/cse409-fa11/notes/12-02-alin-tomescu.pdf
- http://www3.cs.stonybrook.edu/~rob/teaching/cse409-fa11/notes/12-02-luke-mladek.pdf