Proceedings of the 41st Annual Design Automation Conference 2004
DOI: 10.1145/996566.996771
|View full text |Cite
|
Sign up to set email alerts
|

Security as a new dimension in embedded system design

Abstract: The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. Security has been the subject of intensive research in the areas of cryptography, computing, and networking. However, despite these efforts, security is often mis-construe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 206 publications
(35 citation statements)
references
References 40 publications
0
35
0
Order By: Relevance
“…In embedded systems with a software solution, an attacker can extract the executable source code of the device using various methods to reverse engineer cryptographic algorithms and keys [8]…”
Section: Hardware Based Encryption and Digital Signature Solutionmentioning
confidence: 99%
“…In embedded systems with a software solution, an attacker can extract the executable source code of the device using various methods to reverse engineer cryptographic algorithms and keys [8]…”
Section: Hardware Based Encryption and Digital Signature Solutionmentioning
confidence: 99%
“…Security is a serious problem for any system that uses mobile code which moves between different devices, and it has been an important focus of our own and others' research, e.g. [2], [21], [23], [24]. One particular threat is so called 'sleeper viruses' that act as valid and useful modules for a period of time, become accepted in a community, and then after an incubation period 'turn bad' and start to act as damaging viruses.…”
Section: Securitymentioning
confidence: 99%
“…User storage and computation are valuable resources as well, especially for low-end devices that can often be the end-user of multicast communications. In particular, security for embedded systems, like hand-held devices, top set TV, and wireless sensor networks, is an emerging concern [14,36,46]. These systems have severe resource constraints, and even few bits saved by careful design are of extreme importance [23].…”
Section: Introductionmentioning
confidence: 99%