Smashing the stack for fun and profit, Phrack Magazine, vol.49, issue.14, 1996. ,
Distributed authentication of program integrity verification in wireless sensor networks, ACM TISSEC, vol.11, issue.3, 2008. ,
Efficient memory safety for TinyOS, Proceedings of the 5th international conference on Embedded networked sensor systems , SenSys '07, 2007. ,
DOI : 10.1145/1322263.1322283
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.5973
Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks, USENIX Security Symposium, 1998. ,
Advances in OpenBSD, CanSecWest, 2003. ,
Exploiting wireless sensor networks over 802.15.4, ToorCon 9, 2007. ,
Exploiting wireless sensor networks over 802.15.4, Texas Instruments Developper Conference, 2008. ,
Towards self-propagate mal-packets in sensor networks, Proceedings of the first ACM conference on Wireless network security , WiSec '08, 2008. ,
DOI : 10.1145/1352533.1352563
Least we remember: Cold boot attacks on encryption keys, USENIX Security Symposium, 2008. ,
The dynamic behavior of a data dissemination protocol for network programming at scale, Proceedings of the 2nd international conference on Embedded networked sensor systems , SenSys '04, 2004. ,
DOI : 10.1145/1031495.1031506
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006. ,
DOI : 10.1109/ACSAC.2006.9
Exploring symmetric cryptography for secure network reprogramming. ICDCSW, 2007. ,
Authenticated In-Network Programming for Wireless Sensor Networks, ADHOC-NOW, 2006. ,
DOI : 10.1007/11814764_32
Sluice: Secure Dissemination of Code Updates in Sensor Networks, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), 2006. ,
DOI : 10.1109/ICDCS.2006.77
Transmission of ipv6 packets over ieee 802.15.4 networks (rfc 4944), 2007. ,
An architectural approach to preventing code injection attacks. dsn, 2007. ,
DOI : 10.1109/tdsc.2010.1
SWATT: software-based attestation for embedded devices, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004. ,
DOI : 10.1109/SECPRI.2004.1301329
The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315313
On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004. ,
DOI : 10.1145/1030083.1030124
Avrora: scalable sensor network simulation with precise timing, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005., 2005. ,
DOI : 10.1109/IPSN.2005.1440978