Implementation of Complex Strategies of Security Insecure Embedded Systems.
Bruno RobissonMichel AgoyanSébastien Le HenaffPatrick SoquetGuillaume PhanFranck WajsbürtPirouz Bazargan-SabetPublished in: NTMS (2011)
Keyphrases
- embedded systems
- embedded software
- embedded devices
- computing power
- low cost
- real time systems
- processing power
- real time image processing
- protocol stack
- resource limited
- instruction set
- intrusion detection
- software systems
- hardware software
- authentication protocol
- real time embedded
- smart camera
- computing platform
- information security
- private key
- safety critical
- artificial intelligence
- security requirements
- cyber physical systems
- efficient implementation
- hw sw
- database systems