Security Analysis of Vendor Customized Code in Firmware of Embedded Device.
Muqing LiuYuanyuan ZhangJuanru LiJunliang ShuDawu GuPublished in: SecureComm (2016)
Keyphrases
- security analysis
- security requirements
- high security
- public key
- smart card
- security model
- error detection
- user authentication
- image encryption
- encryption scheme
- source code
- operating system
- embedded systems
- authentication protocol
- mutual authentication
- error correction
- data access
- security properties
- power consumption
- data sources
- data mining