2006 13th IEEE International Conference on Electronics, Circuits and Systems 2006
DOI: 10.1109/icecs.2006.379904
|View full text |Cite
|
Sign up to set email alerts
|

Trusted computing - A new challenge for embedded systems

Abstract: Abstract-Security issues become more and more important during the development of mobile devices. In this paper we propose a thorough overview of processor-based solutions to protect programs and data exchanges within embedded systems. A discussion about the limitations of existing solutions is provided and new directions are proposed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2008
2008
2008
2008

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…The security of (embedded) computer systems was an active research area in both academia and industry long before the TCG started to develop trust specifications for mobile devices [13,17,18,23,24,37]. This extensive body of research was triggered, in part, by the observation that basic protection mechanisms like providing virtual memory or separating user and supervisor modes are simply not sufficient to safeguard effectively against the ever-growing number of malicious attacks [12].…”
Section: Introductionmentioning
confidence: 99%
“…The security of (embedded) computer systems was an active research area in both academia and industry long before the TCG started to develop trust specifications for mobile devices [13,17,18,23,24,37]. This extensive body of research was triggered, in part, by the observation that basic protection mechanisms like providing virtual memory or separating user and supervisor modes are simply not sufficient to safeguard effectively against the ever-growing number of malicious attacks [12].…”
Section: Introductionmentioning
confidence: 99%