Consideration of Security Attacks in the Design Space Exploration of Embedded Systems.
Lukas GresslChristian StegerUlrich NeffePublished in: DSD (2019)
Keyphrases
- embedded systems
- design space exploration
- security mechanisms
- security protocols
- low cost
- design space
- embedded devices
- computing power
- access control
- software systems
- security issues
- computer architecture
- hardware software
- design process
- information security
- field programmable gate array
- intrusion detection
- embedded software
- protocol stack
- security requirements
- hw sw
- key management
- network security
- case study
- real world
- smart card
- information systems
- artificial intelligence