Challenges in Designing Exploit Mitigations for Deeply Embedded Systems.
Ali AbbasiJos WetzelsThorsten HolzSandro EtallePublished in: CoRR (2020)
Keyphrases
- embedded systems
- low cost
- computing power
- processing power
- resource limited
- embedded software
- hardware software
- embedded devices
- real time image processing
- real time systems
- embedded real time systems
- software systems
- hw sw
- poses unique challenges
- safety critical
- case study
- communication technologies
- field programmable gate array
- wireless sensor networks
- artificial intelligence
- consumer electronics
- real world