Filters








50,636 Hits in 8.6 sec

Detecting Software Theft in Embedded Systems: A Side-Channel Approach

Georg T. Becker, Daehyun Strobel, Christof Paar, Wayne Burleson
2012 IEEE Transactions on Information Forensics and Security  
All three approaches make use of side-channel information that is obtained during the execution of the suspicious code.  ...  In this paper, we present three verification methods to detect software plagiarism in embedded software without knowing the implemented source code.  ...  The previous two methods to detect software plagiarism can be used by a verifier to detect whether or not his code is present in an embedded system.  ... 
doi:10.1109/tifs.2012.2191964 fatcat:koo26zx5hnbgdmguwhmnxpgeg4

Cyber-Physical Systems Attestation

Junia Valente, Carlos Barreto, Alvaro A. Cardenas
2014 2014 IEEE International Conference on Distributed Computing in Sensor Systems  
While software attestation can help a verifier check the integrity of devices, it still has several drawbacks that have limited their application in the field, like establishing an authenticated channel  ...  This is different from more strict approaches that aim to build trustworthy systems that can reliably attest on their integrity (e.g., truthfully report whether the system is in a good state or in a bad  ... 
doi:10.1109/dcoss.2014.61 dblp:conf/dcoss/ValenteBC14 fatcat:uvgd2sverzh75p3pgibykejygu

Design Pattern Representation for Safety-Critical Embedded Systems

Ashraf Armoush, Falk Salewski, Stefan Kowalewski
2009 Journal of Software Engineering and Applications  
As non-functional requirements are an important aspect in the design of safety-critical embedded systems, this work focuses on the integration of non-functional implications in an existing design pattern  ...  We propose a pattern representation for safety-critical embedded application design methods by including fields for the implications and side effects of the represented design pattern on the non-functional  ...  Many researches have focused on the use of design pattern in the software domain [2, 5, 6, 7, 8, 9] , but further research is still needed in the domain of safetycritical embedded systems to integrate  ... 
doi:10.4236/jsea.2009.21001 fatcat:umoxrag34rdoti4abpoe7jmp3a

Security in embedded systems

Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady
2004 ACM Transactions on Embedded Computing Systems  
The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation.  ...  embedded systems.  ...  , and side-channel attacks, require that the system be secure even when it can be logically or physically accessed by malicious entities.  ... 
doi:10.1145/1015047.1015049 fatcat:2x62l5pmdnawhnisbbfdvvgkly

Security in Building Automation Systems

Wolfgang Granzer, Fritz Praus, Wolfgang Kastner
2010 IEEE transactions on industrial electronics (1982. Print)  
They have their origin in a time where security has been considered as a side issue at best.  ...  This paper starts with a security threat analysis and identifies the challenges of providing security in the building automation domain.  ...  allows one to verify the data origin. 2) Trusted channel: In a trusted channel, data freshness and data integrity are guaranteed. 3) Confidential channel: In a confidential channel, the transmitted data  ... 
doi:10.1109/tie.2009.2036033 fatcat:bstxjmiclzgsdm3ph4zvwvcree

Secure Composition for Hardware Systems (Dagstuhl Seminar 19301)

Divya Arora, Ilia Polian, Francesco Regazzoni, Patrick Schaumont, Michael Wagner
2019 Dagstuhl Reports  
hardware is integrated within a system that includes software.  ...  Theoretical foundations of secure composition have been laid out in the past, but they are limited to software systems.  ...  Does time play a role in composition? Time does play a role in composition; for example, timing of the composed system (order of events) is a side-channel.  ... 
doi:10.4230/dagrep.9.7.94 dblp:journals/dagstuhl-reports/AroraPRS19 fatcat:bwsa4luz6fb7ri7q62p5vxpefa

Securing embedded systems

D.D. Hwang, P. Schaumont, K. Tiri, I. Verbauwhede
2006 IEEE Security and Privacy  
To address embedded systems' physical accessibility, we can incorporate tamper resistance (not addressed in this article) and resistance to side-channel attacks in the secure module.  ...  Circuit level: Combating electrical side-channel attacks At the circuit level, the system can be implemented as an integrated circuit with measures such as tamper proofing to defend against physical attacks  ... 
doi:10.1109/msp.2006.51 fatcat:k2udku6yvrejdcfx544dwg4tgy

Multicore enablement for Cyber Physical Systems

Andreas Herkersdorf
2012 2012 International Conference on Embedded Computer Systems (SAMOS)  
During the seminar the participants from industry and academia actively discussed chances and problems of multicore processors in embedded in cyber-physical systems.  ...  Except where otherwise noted, content of this report is licensed under a Creative Commons BY 3.0 Unported license Embedded and Cyber Physical Systems exhibit demands for "non-functional requirements",  ...  An example of a side channel can be found in a NoC where the temporal properties of a given communication channel depend (even slightly) on the communication activities on another communication channel  ... 
doi:10.1109/samos.2012.6404198 dblp:conf/samos/Herkersdorf12 fatcat:73whij7ozbfgpimxz4md3f4jii

Codesign of embedded systems: status and trends

R. Ernst
1998 IEEE Design & Test of Computers  
Memory is becoming a dominant cost factor in integrated systems and often bottlenecks system performance.  ...  Consequently, a considerable amount of assembly coding in embedded systems is still observed. 4 .  ... 
doi:10.1109/54.679207 fatcat:7ghyeusfczbepg5adsbge3qvhu

Integrating model checking and UML based model-driven development for embedded systems

Zamira Daw, Rance Cleaveland, Marcus Vetter
2014 Electronic Communications of the EASST  
This paper discusses issues associated with integrating model checkers into a model-based development environment for embedded systems.  ...  This paper discusses issues involved in integrating model checkers into DMOSES and reports on a performance evaluation of two model checkers in particular: NuSMV and UPPAAL  ...  Acknowledgments The research for this paper was undertaken during a stay as visiting researcher in the Fraunhofer USA Center for Experimental Software Engineering.  ... 
doi:10.14279/tuj.eceasst.66.888 dblp:journals/eceasst/DawCV13 fatcat:tqmvnyqmt5g2jcrl7p4qw3dol4

Evaluation of an Abstract Component Model for Embedded Systems Development

Christian Bunse, Yunja Choi, Hans Gerhard Gross
2012 Journal of Information Processing Systems  
Section 4 outlines a system used as demonstrator case study. Section 5 presents the evaluation of the MARTMOT method in comparison with the Agile development approach.  ...  Model-driven and component-oriented development is increasingly being used in the development of embedded systems.  ...  Within this phase software requirements and boundary conditions are specified and are then refined to a functional (system structure) and a technical (integration into larger frameworks, etc.) software  ... 
doi:10.3745/jips.2012.8.4.539 fatcat:2txmyphn6nhzpozxrirjseseja

Multilevel Design Validation in a Secure Embedded System

P. Schaumont, D. Hwang, Shenglin Yang, I. Verbauwhede
2006 IEEE transactions on computers  
We discuss how the ThumbPod-2 design is partitioned into a side-channel-free implementation, and how a codesign environment called GEZEL is used to validate this partitioning process at each abstraction  ...  We present a simulation-based methodology to support secure embedded design. The methodology is explained through a case study, the Thumbpod-2 portable embedded fingerprint authenticator.  ...  withstand a wide range of security attacks. VII.  ... 
doi:10.1109/tc.2006.184 fatcat:ra7zvrwknbep5b67byuzdk54lq

Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure

Fahad Siddiqui, Matthew Hagan, Sakir Sezer
2019 2019 32nd IEEE International System-on-Chip Conference (SOCC)  
This has been attacked through a covert cache-based attack, resulting in leaking of information using mi-croarchitecture side-channels.  ...  Considering these diverse cyber security challenges, there is a need for adopting a holistic rather than continue pursuing passive approach to achieve cyber resilience in embedded systems.  ... 
doi:10.1109/socc46988.2019.1570548325 dblp:conf/socc/SiddiquiHS19 fatcat:wblfi3hae5hurgcuqks46hypua

Managing Security in FPGA-Based Embedded Systems

Ted Huffmire, Brett Brotherton, Timothy Sherwood, Ryan Kastner, Timothy Levin, Thuy D. Nguyen, Cynthia Irvine
2008 IEEE Design & Test of Computers  
As they become more common in critical embedded systems, new techniques are necessary to manage security in FPGA designs.  ...  Because FPGAs can provide a useful balance between performance, rapid time to market, and flexibility, they have become the primary source of computation in many critical embedded systems. 1,2 The aerospace  ...  This research was funded in part by National Science Foundation grant CNS-0524771 and NSF Career grant CCF-0448654.  ... 
doi:10.1109/mdt.2008.166 fatcat:geb3q2d3krf4pfetb4ncatdzlm

Security as a new dimension in embedded system design

Srivaths Ravi, Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan
2004 Proceedings of the 41st annual conference on Design automation - DAC '04  
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems.  ...  We then identify the implied challenges for embedded system architects, as well as hardware and software designers (e.g., tamper-resistant embedded system design, processing requirements for security,  ...  Physical and Side-channel Attacks, and Tamper-resistant Hardware In addition to software attacks, there are physical and side-channel attacks that exploit the system implementation or its identifying properties  ... 
doi:10.1145/996566.996771 dblp:conf/dac/RaviKLMR04 fatcat:z2yobwi7kneo7ipdhjfulk32ay
« Previous Showing results 1 — 15 out of 50,636 results