[BOOK][B] Firmware structure and architectural support for monitors, vertical migration and user microprogramming

M Maekawa, K Sakamura, C Ishikawa - 1982 - dl.acm.org
… application users are allowed to write their own firmware, many considerations must be made
at microprogramming level. For instance, application users are not always trustful. In fact, it must
be taken for grented that applica- tion users make errors and eveT try malicious use of …

Firmware for an intelligent digital multimeter

G Wale, D Rustici - … , 1988. IMTC-88. Conference Record., 5th …, 1988 - ieeexplore.ieee.org
… Certain features of the design of a DMM which require intelligent firmware are reported including
high system throughput, measurement algorithms … protection of calibration constants including
how they are kept secure from erasure, either by accident or by malicious attempts is …

[BOOK][B] Computer Security Requirements: Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments

US Department of Defense - 1985 - Springer
… maintenance of a system. Malicious logic Hardware, software, or firmware that is
intentionally included in a system for the purpose of causing loss or harm (eg, Trojan
horses). Multilevel security mode The mode of operation …

Firmware realization of an operating system

M Maekawa, K Sakamura, C Ishikawa… - Microprocessing and …, 1981 - Elsevier
… users are allowed to write their own firmware, many considerations must be made at the
microprogramming level. For instance, ap- plication users are not always trustful. In fact, it must
be taken for granted that application users make error and even try malicious use of the …

Information security in integrated avionic systems

WE Gibbons - … , 1989. NAECON 1989., Proceedings of the IEEE …, 1989 - ieeexplore.ieee.org
… level of trust and trusted computer system evaluation criteria which must be fulfilled by the
hardware, firmware and software of … including maintainers) have sufficient clearances and
authorizations to provide acceptable presumption that they have not introduced malicious logic …

[PDF][PDF] Denial of service flaws in SDI software-an initial assessment

KA Nyberg - Fourth Aerospace Computer Security Applications, 1988 - computer.org
… The application of this principle limits the damage that can result from accident, error, or
unauthorized use. Malicious Logic. Hardware, software, or firmware that is intentionally
included in a system for the purpose of causing loss or harm. Object …

[CITATION][C] DRSEL-NL-BG-3

GE Brown - Digest of Papers-Compcon: IEEE …, 1976 - Institute of Electrical and Electronics …

[PDF][PDF] National Computer Security Center 9800 Savage Road Fort George G. Meade, MD 20755-6000 Attention: Chief, Criteria and Technical Guidelines Division

PR Gallagher Jr - 1988 - borax.polux-hosting.com
… Maintenance hooks are special types of trap doors. malicious logic Hardware,
software, or firmware that is intentionally included in a system for an unauthorized
purpose; eg, a Trojan horse. mandatory access control (MAC) …

[PDF][PDF] Glossary of Computer Security Terms. Version 1

MS Whittaker, S Berg, C Lane - 1988 - dtic.mil
… Maintenance hooks are special types of trap doors. malicious logic Hardware,
software, or firmware that is intentionally included in a system for an unauthorized
purpose; eg, a Trojan horse. mandatory access control (MAC) …

Glossary of Computer Security Terms

US Department of Defense - The 'Orange Book'Series, 1985 - Springer
… An assembly of computer hardware, software and/or firmware configured to collect, create,
communicate, compute, disseminate, process, store, and … have sufficient clearances and
authorizations to provide an acceptable presumption that they have not introduced malicious …