Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems.
Huw ReadIain SutherlandKonstantinos XynosFrode RoarsonPublished in: Inf. Secur. J. A Glob. Perspect. (2015)
Keyphrases
- embedded systems
- computing power
- embedded devices
- low cost
- resource limited
- embedded software
- hardware software
- processing power
- access control
- safety critical
- network security
- security requirements
- real time systems
- cyber physical systems
- real time image processing
- protocol stack
- security mechanisms
- hw sw
- embedded real time systems
- security protocols
- field programmable gate array
- security issues
- intrusion detection
- software systems
- real time
- concurrency control
- cooperative
- flash memory
- communication technologies