Tiered trust for useful embedded systems security.
Hudson AyersPrabal DuttaPhilip Alexander LevisAmit LevyPat PannutoJohnathan Van WhyJean-Luc WatsonPublished in: EuroSec@EUROSYS (2022)
Keyphrases
- embedded systems
- low cost
- security services
- real time systems
- resource limited
- trust management
- trusted computing
- computing power
- embedded devices
- processing power
- cyber physical systems
- embedded software
- trust negotiation
- real time image processing
- trust model
- embedded real time systems
- computing platform
- open environments
- protocol stack
- software systems
- security requirements
- hw sw
- information security
- security issues
- access control
- intrusion detection
- trust relationships
- hardware software
- safety critical
- field programmable gate array
- communication technologies
- security protocols
- key management
- resource constrained
- network security
- consumer electronics
- mobile devices
- database systems
- smart grid
- flash memory
- real time