Embedded systems security: Threats, vulnerabilities, and attack taxonomy.
Dorottya PappZhendong MaLevente ButtyánPublished in: PST (2015)
Keyphrases
- embedded systems
- security threats
- security risks
- security issues
- security mechanisms
- denial of service attacks
- resource constrained
- low cost
- security measures
- key management
- information security
- embedded devices
- countermeasures
- software systems
- embedded software
- sensitive data
- attack graphs
- attack graph
- smart card
- access control
- security vulnerabilities
- database
- secret key
- network security
- software engineering
- artificial intelligence
- databases