129,743 Hits in 4.1 sec

Development and Production Processes for Secure Embedded Control Devices [chapter]

Tobias Rauter, Andrea Höller, Johannes Iber, Christian Kreiner
2016 Communications in Computer and Information Science  
Security architecture for SCADA system Implication on lifecycle? Development phase? Assessment, Privilege Separation Production phase?  ...  Component Certified Product Production Phase Unified process/tools, OEM in control Enabled by hardware security Certify hardware, control contingents No unnecessary exposure Temporary harness  ... 
doi:10.1007/978-3-319-44817-6_10 fatcat:3f3anshu3nbahaqnj6mik6xy6q

Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges [chapter]

Feng Xie, Yong Peng, Wei Zhao, Yang Gao, Xuefeng Han
2014 Lecture Notes in Computer Science  
Cyber security for industrial automation and control systems has been a much discussed topic in recent years. Security evaluation of industrial control devices has been gaining rising attention.  ...  In this paper, the security evaluation standards for industrial control devices are analyzed, and the corresponding several certifications are compared.  ...  For example, EDSA involves security development process assessment, and APC is itself fit for process vendors.  ... 
doi:10.1007/978-3-662-45237-0_57 fatcat:2yyw57gc3fgoxluddft7nxtpc4

Securing IP networks

Sindhu Xirasagar, Masoud Mojtahed
2010 Network Security  
, and in-line IPsec processing with an embedded security engine.  ...  Control-plane and managementplane software execute on an embedded CPU or on an external CPU.  ... 
doi:10.1016/s1353-4858(10)70016-7 fatcat:c3kgqosp4vfg3nvausrwvvfup4

Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures

Matthew Hagan, Fahad Siddiqui, Sakir Sezer
2018 2018 31st IEEE International System-on-Chip Conference (SOCC)  
This process typically provides a high level guideline to solving security problems which can then be implemented during design and development.  ...  Given that threats and vulnerabilities can exist within any layer of the complex eco-system, OEMs face a major challenge to ensure security throughout the device life-cycle To lower the potential risk  ...  and steps for creating a security model for connected embedded devices.  ... 
doi:10.1109/socc.2018.8618544 dblp:conf/socc/HaganSS18 fatcat:f3dyzrpaofh2tazhsm5lgxtr5q

Internet Bağlantılı Gömülü Sistemlerde Güvenlik Açıkları

Ahmet Efe, Melike Sarıkaya, Merve Altınbaş
2019 Erzincan Üniversitesi Fen Bilimleri Enstitüsü Dergisi  
For this reason, a study carried out according to the general structure of embedded systems to define and overcome these deficits.  ...  This year, the ban on Huawei products by the US and a number of western countries is due to the main concerns in cyber security.  ...  on the local and national product development.  ... 
doi:10.18185/erzifbed.565044 fatcat:4j7mpw7xpjfqnctwrp2dxb2vfm

Mils: Business, Legal And Social Acceptance

Christophe Toulemonde, Jacques Brygier, Holger Blasum, Sergey Tverdyshev, Bertrand Leconte, Kevin Müller, Axel Söding - Freiherr von Blomberg, Igor Furgel, Martina Truskaller
2015 Zenodo  
For example, medical devices become more sophisticated and need to integrate wireless communication, security protocols, USB connectivity, persistent storage, and portable touch screens.  ...  We extended the analysis to adjacent markets such as medical, finance, utilities, industries network and communication. All these market deploy embedded systems with high level of security.  ...  CC provides a structured review process for developing more secure products that incorporates sufficient flexibility to address new and emerging threats.  ... 
doi:10.5281/zenodo.47301 fatcat:2njeypzu4jfgjaygciloaj4zae

Security and privacy challenges in industrial internet of things

Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner
2015 Proceedings of the 52nd Annual Design Automation Conference on - DAC '15  
generation of embedded devices.  ...  These systems generate, process, and exchange vast amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks.  ...  Programmable logic controllers are replaced by more advanced cyberphysical systems (CPS), which are freely programmable embedded devices that control physical processes.  ... 
doi:10.1145/2744769.2747942 dblp:conf/dac/SadeghiWW15 fatcat:5xtdkzjs4jggjfng7juny2r3pa


Vladyslav Her, Viktoriia Taraniuk, Valentyna Tkachenko, Serhiy Nikolskiy, Iryna Klymenko
2021 Information, Computing and Intelligent systems  
A performance test was also developed to test the load. Received basic knowledge of testing theory, as well as skills of writing and using bash scripts for performance tests.  ...  The article describes the basics of testing: writing test documentation (an example based on a report defect was proposed) and some testing methods.  ...  Security testing: Application security for IoT devices is probably the biggest problem for most users.  ... 
doi:10.20535/2708-4930.2.2021.244169 fatcat:s7ymxh6rmrgjvgbijrgugt4vcy

Integrated Manufacturing Management using Internet of Things

Roberto A.Dias, Igor T. M. Mendonça, Adriano Regis
2012 International Journal of Computer Applications  
The integration between programmable logic controllers (PLCs) and supervision and control software's has been a critical factor for industrial production management.  ...  The goal of this work is to show a new approach for development of an integration framework for industrial processes using the best practices of Service Oriented Architecture (SOA) and the recent integration  ...  One of the existing solutions on the integration of industrial networks is the use of Object Linking and Embedding for Process Control (OLE for process control or simply OPC).  ... 
doi:10.5120/8086-1553 fatcat:4pajpof5nvecpm2q2c2zkfdlvq

A Survey on Developing Secure IoT Products

Priyang Bhatt, Gujarat Technological University, V. V Nagar, Anand , India, Dept. of ECE, G H Patel College of Engineering and Technology, V. V Nagar, Anand, India, TCR Advanced Engineering Pvt. Ltd., Vadodara, India, Bhasker Thaker, Neel Shah
2018 International Journal of Scientific Research in Computer Sciences and Engineering  
In this we paper we survey and highlight some crucial and primary concepts related to IoT Security which have to be incorporated in the IoT system design and development as well as during deployment of  ...  This vision would revolutionize current models and processes in business and daily life. Needless to say being such an impactful concept, security in IoT becomes even more critical than before.  ...  DEVICE SUPPORT FOR IOT SECURITY Many new IoT devices developed in recent times like NXP iMX7 Solo applications processor that is used on the NXP WaRP7 IoT and Wearable Development Platform which is an  ... 
doi:10.26438/ijsrcse/v6i5.4144 fatcat:6exeu2bk4zgwlc52dcdicypfxa

A lightweight embedded web server for non- internet devices

Guangjie Han, Deokjai Choi, Tam Van Nguyen
2007 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet  
fast and user-friendly ways to access, monitor, control and configure non-Internet devices with standard Web browsers in real-time.  ...  In this paper, we propose a lightweight Embedded Web Server (EWS) -Webit which enables a stand connection to non-Internet devices using the Internet and evaluate how far it can be said to give the users  ...  ACKNOWLEDGMENT We thank the BK 21 Project of Korea and the anonymous reviewers for useful comments.  ... 
doi:10.1109/canet.2007.4401710 fatcat:qodeeqfm4zg3vj4bk3yuy5wc2u

Vulnerabilities' Assessment and Mitigation Strategies for the Small Linux Server, Onion Omega2

Darshana Upadhyay, Srinivas Sampalli, Bernard Plourde
2020 Electronics  
The merger of SCADA (supervisory control and data acquisition) and IoTs (internet of things) technologies allows end-users to monitor and control industrial components remotely.  ...  effective mitigations and security best practices.  ...  Acknowledgments: Thanks to Brian Stacey, Rohit Joshi and Marzia Zaman of Cistel Technologies for their valuable feedback. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics9060967 fatcat:ev5aob37w5gtng53r2ialr7vwq

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things

Matthew Hagan, Fahad Siddiqui, Sakir Sezer, BooJoong Kang, Kieran McLaughlin
2018 2018 IEEE Conference on Dependable and Secure Computing (DSC)  
This work aims to simplify and enhance the security evaluation process for IoT devices, making the development process more cost efficient and secure.  ...  Security within the Product Development Lifecycle Microsoft's Security Development Life-cycle [12] details high level goals for achieving security.  ... 
doi:10.1109/desec.2018.8625140 dblp:conf/desec/HaganSSKM18 fatcat:egia5tbi5zfffmzpaag42nbg3m

Challenges of secure and reliable data management in heterogeneous environments

Norbert Siegmund, Janet Feigenspan, Michael Soffner, Jana Fruth, Veit Köppen
2010 Proceedings of the First International Workshop on Digital Engineering - IWDE '10  
Ubiquitous computing is getting more important since requirements for complex systems grow fast. In these systems, embedded devices have to fulfill different tasks.  ...  In this paper, we highlight challenges for interoperability, data management, and security, which arise with complex systems.  ...  The authors would also like to thank Tobias Hoppe, Jana Dittmann, Frank Ortmeier, and Olaf Poenicke for their assistance and preliminary work.  ... 
doi:10.1145/1837154.1837157 dblp:conf/iwde/SiegmundFSFK10 fatcat:2zite2unkjdghjbo52uakbpbpe

Embedded security in a pervasive world

Christof Paar, André Weimerskirch
2007 Information Security Technical Report  
This article describes security issues in current and future pervasive security scenarios, ranging from privacy threats and unreliable products to loss of revenue.  ...  Embedded systems have become an integral part of our everyday life. Devices like vehicles, household appliances, and cell phones are already equipped with embedded microcontrollers.  ...  feature activation in embedded systems Most technologies needed for embedded security are currently under development in industry and academia, and embedded security is arguably one of the most active  ... 
doi:10.1016/j.istr.2007.05.006 fatcat:rbcdojsywvhwjdapqrp4k5cdpq
« Previous Showing results 1 — 15 out of 129,743 results