منابع مشابه
Securing Embedded Systems
Securing Embedded Systems: From Analyses of Modern Automotive Systems to Enabling Dynamic Analysis
متن کاملChaotic Memory Randomization for Securing Embedded Systems
Embedded systems permeate through nearly all aspects of modern society. From cars to refrigerators to nuclear refineries, securing these systems has never been more important. Intrusions, such as the Stuxnet malware which broke the centrifuges in Iran’s Natanz refinery, can be catastrophic to not only the infected systems, but even to the wellbeing of the surrounding population. Modern day prot...
متن کاملOn Securing Networked Real-Time Embedded Systems
There has been an exponential growth of applications that rely on diverse types of embedded real-time end systems and devices, such as smart phones, play stations, home appliances, consumer and industrial electronics, smart sensors and actuators. These applications require diverse types of Quality-of-Service (QoS) including timeliness, dependability, security and privacy, from the end systems/d...
متن کاملSecuring Embedded User Interfaces: Android and Beyond
Web and smartphone applications commonly embed third-party user interfaces like advertisements and social media widgets. However, this capability comes with security implications, both for the embedded interfaces and the host page or application. While browsers have evolved over time to address many of these issues, mobile systems like Android—which do not yet support true cross-application int...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Security & Privacy Magazine
سال: 2006
ISSN: 1540-7993
DOI: 10.1109/msp.2006.51