Embedded Software Security through Key-Based Control Flow Obfuscation.
Rajat Subhra ChakrabortySeetharam NarasimhanSwarup BhuniaPublished in: InfoSecHiComNet (2011)
Keyphrases
- control flow
- embedded software
- data flow
- development projects
- software architecture
- process model
- embedded systems
- active rules
- software testing
- security requirements
- workflow management systems
- formal semantics
- access control
- database
- information security
- modeling language
- low cost
- databases
- network security
- test cases