Do Not Ship, or Receive, Trojan Horses - Avoiding Network Vulnerabilities Potentially Introduced by Embedded Systems.
Corey HirschPublished in: IICIS (2004)
Keyphrases
- embedded systems
- protocol stack
- low cost
- computing power
- resource limited
- embedded software
- embedded devices
- hardware software
- communication technologies
- software systems
- real time systems
- embedded real time systems
- computer networks
- field programmable gate array
- processing power
- real time image processing
- network structure
- information security
- network traffic
- wireless sensor networks
- artificial intelligence
- buffer overflow
- real time