Getting Started with Secure Embedded Systems

2022 ◽  
Author(s):  
Alexandru Radovici ◽  
Ioana Culic
2005 ◽  
Author(s):  
Thuy D. Nguyen ◽  
Timothy E. Levin ◽  
Cynthia E. Irvine

2020 ◽  
Vol 10 (9) ◽  
pp. 3125
Author(s):  
Saad Mubeen ◽  
Elena Lisova ◽  
Aneta Vulgarakis Feljan

Cyber Physical Systems (CPSs) are systems that are developed by seamlessly integrating computational algorithms and physical components, and they are a result of the technological advancement in the embedded systems and distributed systems domains, as well as the availability of sophisticated networking technology. Many industrial CPSs are subject to timing predictability, security and functional safety requirements, due to which the developers of these systems are required to verify these requirements during the their development. This position paper starts by exploring the state of the art with respect to developing timing predictable and secure embedded systems. Thereafter, the paper extends the discussion to time-critical and secure CPSs and highlights the key issues that are faced when verifying the timing predictability requirements during the development of these systems. In this context, the paper takes the position to advocate paramount importance of security as a prerequisite for timing predictability, as well as both security and timing predictability as prerequisites for functional safety. Moreover, the paper identifies the gaps in the existing frameworks and techniques for the development of time- and safety-critical CPSs and describes our viewpoint on ensuring timing predictability and security in these systems. Finally, the paper emphasises the opportunities that artificial intelligence can provide in the development of these systems.


Author(s):  
Ali Ahmadinia ◽  
Ahmed Saeed

As computing devices have become an almost integral part of our lives, security of systems and protection of the sensitive data are emerging as very important issues. This is particularly evident for embedded systems which are often deployed in unprotected environments and at the same time being constrained by limited resources. Security and trust have also become important considerations in the design of virtually all modern embedded systems as they are utilized in critical and sensitive applications such as in transportation, national infrastructure, military equipment, banking systems, and medical devices. The increase in software content and network connectivity has made them vulnerable to fast spreading software-based attacks such as viruses and worms, which were hitherto primarily the concern of personal computers, servers, and the internet. This chapter discusses the basic concepts, security attacks types, and existing preventive measures in the field of embedded systems and multi-core systems.


Sign in / Sign up

Export Citation Format

Share Document