Securing embedded systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Embedded Systems

Securing Embedded Systems: From Analyses of Modern Automotive Systems to Enabling Dynamic Analysis

متن کامل

Chaotic Memory Randomization for Securing Embedded Systems

Embedded systems permeate through nearly all aspects of modern society. From cars to refrigerators to nuclear refineries, securing these systems has never been more important. Intrusions, such as the Stuxnet malware which broke the centrifuges in Iran’s Natanz refinery, can be catastrophic to not only the infected systems, but even to the wellbeing of the surrounding population. Modern day prot...

متن کامل

On Securing Networked Real-Time Embedded Systems

There has been an exponential growth of applications that rely on diverse types of embedded real-time end systems and devices, such as smart phones, play stations, home appliances, consumer and industrial electronics, smart sensors and actuators. These applications require diverse types of Quality-of-Service (QoS) including timeliness, dependability, security and privacy, from the end systems/d...

متن کامل

Securing Embedded User Interfaces: Android and Beyond

Web and smartphone applications commonly embed third-party user interfaces like advertisements and social media widgets. However, this capability comes with security implications, both for the embedded interfaces and the host page or application. While browsers have evolved over time to address many of these issues, mobile systems like Android—which do not yet support true cross-application int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Security & Privacy Magazine

سال: 2006

ISSN: 1540-7993

DOI: 10.1109/msp.2006.51