Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Micro embedded monitoring for security in application specific instruction-set processors
Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems
On-Chip Communication Architectures: System on Chip Interconnect
On-Chip Communication Architectures: System on Chip Interconnect
Hardware support for secure processing in embedded systems
Proceedings of the 44th annual Design Automation Conference
Securing Designs against Scan-Based Side-Channel Attacks
IEEE Transactions on Dependable and Secure Computing
Reconfigurable hardware for high-security/high-performance embedded systems: the SAFES perspective
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Towards trojan-free trusted ICs: problem analysis and detection scheme
Proceedings of the conference on Design, automation and test in Europe
MERO: A Statistical Approach for Hardware Trojan Detection
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Securing the data path of next-generation router systems
Computer Communications
Securing embedded smart cameras with trusted computing
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Transactions on computational science X
A Proposal for a Privacy-preserving National Identity Card
Transactions on Data Privacy
DynaPoMP: dynamic policy-driven memory protection for SPM-based embedded systems
WESS '11 Proceedings of the Workshop on Embedded Systems Security
Efficient scheme of verifying integrity of application binaries in embedded operating systems
The Journal of Supercomputing
Java type confusion and fault attacks
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Towards a privacy-preserving national identity card
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
The challenges raised by the privacy-preserving identity card
Cryptography and Security
Randomized Instruction Injection to Counter Power Analysis Attacks
ACM Transactions on Embedded Computing Systems (TECS)
Verification across Intellectual Property Boundaries
ACM Transactions on Software Engineering and Methodology (TOSEM)
Memory encryption: A survey of existing techniques
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
To secure digital assets, a tasteful integration of a variety of technologiesand processes is necessary. Tamper-resistance is being increasinglyused as an important piece of a more comprehensive securitysystem. It provides an effective barrier to entry and protectsdigital assets in the embedded systems from most people and mostattacks. Embedded systems pose unique security challenges becausethey are largely used in relationships where one party wantsto put a secure, embedded device, in the hands of another, withthe assurance that the second party cannot modify/hack the device.First, we outline the major attacks that threaten the security of anembedded system. The vulnerability landscape of an embeddedsystem is a vast expanse of attacks. A good understanding of thethreats is necessary so that countermeasures can be devised to protectagainst threats that pose the greatest risk. Second, we presentcountermeasures and discuss their effectiveness in protecting thecrown jewels of an embedded system: boot code, operating systemsoftware and embedded hardware. A clear understanding of attacksand countermeasures enables a system architect to make rationalinvestment decisions in designing a secure, embedded system.