[图书][B] Making Small Embedded Systems Secure and Dependable

HR Ayers - 2023 - search.proquest.com
Low-power, low-cost embedded microcontrollers (MCUs) are frequently used in security-
critical settings. Recent systems advances, such as type-safe languages and standardized …

Generating Optimized and Secure Binary Code

RM Tsoupidi - 2023 - diva-portal.org
The increased digitalization of modern societies has resulted in a proliferation of a broad
spectrum of embedded devices, ranging from personal smartphones and heart pacemakers …

[图书][B] Topics in secure embedded system design

N Potlapally - 2008 - search.proquest.com
Pervasive networks have led to widespread use of embedded systems, like cell phones,
PDAs, RFIDs etc., in increasingly diverse applications. Many of these embedded system …

How low can you go? Recommendations for hardware-supported minimal TCB code execution

JM McCune, B Parno, A Perrig, MK Reiter… - ACM SIGOPS …, 2008 - dl.acm.org
We explore the extent to which newly available CPU-based security technology can reduce
the Trusted Computing Base (TCB) for security-sensitive applications. We find that although …

Secure application execution in mobile devices

MG Msgna, H Ferradi, RN Akram… - The New Codebreakers …, 2016 - Springer
Smart phones have rapidly become hand-held mobile devices capable of sustaining
multiple applications. Some of these applications allow access to services including …

[图书][B] Embedded systems security: practical methods for safe and secure software and systems development

D Kleidermacher, M Kleidermacher - 2012 - books.google.com
The ultimate resource for making embedded systems reliable, safe, and secure Embedded
Systems Security provides: A broad understanding of security principles, concerns, and …

SIC2: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors

B Pearson, C Zou, Y Zhang, Z Ling… - 2020 IEEE 26th …, 2020 - ieeexplore.ieee.org
In this paper, we explore the use of microcontrollers (MCUs) and crypto coprocessors to
secure IoT applications, and show how developers may implement a low-cost platform that …

Security standards for embedded devices and systems

V Kowkutla, S Ravi - Fundamentals of IP and SoC Security: Design …, 2017 - Springer
Designing a secure SoC starts with the collation of product or system security requirements
as dictated by the market (s) where the chip will be deployed. In many of these markets …

Security in embedded systems: Design challenges

S Ravi, A Raghunathan, P Kocher… - ACM Transactions on …, 2004 - dl.acm.org
Many modern electronic systems---including personal computers, PDAs, cell phones,
network routers, smart cards, and networked sensors to name a few---need to access, store …

[PDF][PDF] Low overhead hardware techniques for software and data integrity and confidentiality in embedded systems

A Rogers - Masters Abstracts International, 2007 - Citeseer
Computer security is an ever-increasing challenge. Billions of microprocessors have been
sold, most of which form parts of embedded computer systems. Computers are subject to …