Tutorial T2: Validation and Debug of Security and Trust Issues in Embedded Systems.
Prabhat MishraSwarup BhuniaSrivaths RaviPublished in: VLSI Design (2015)
Keyphrases
- embedded systems
- security issues
- low cost
- computing power
- trusted computing
- resource limited
- real time systems
- embedded devices
- computing platform
- embedded software
- trust management
- hardware software
- trust model
- information security
- open environments
- processing power
- protocol stack
- flash memory
- safety critical
- real time image processing
- trust negotiation
- cyber physical systems
- trust relationships
- access control
- security mechanisms
- security policies
- network security
- hw sw
- intrusion detection
- field programmable gate array
- multi agent systems
- open source
- software systems
- project management
- security requirements