secure embedded systems
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 3)

H-INDEX

6
(FIVE YEARS 0)

2022 ◽  
Author(s):  
Alexandru Radovici ◽  
Ioana Culic


2021 ◽  
Vol 12 (3) ◽  
pp. 1-20
Author(s):  
Fateh Boutekkouk

In this work, the authors present their solution to select the best operating system for an efficient security-aware design of embedded systems. This problem is formulated as a MCDM problem and solved using a hybrid approach combining fuzzy AHP and fuzzy VIKOR. This combination enables the authors to take profit of both methods. From AHP, they exploited the hierarchy and the pairwise comparison between criteria that leads to finding the importance (weight) of each criteria more consistently. On the other hand, from the VIKOR method, they leverage its power to compromise between conflictual criteria. Since they are dealing with unprecise and subjective advises, they opt for the fuzzy versions of the AHP and VIKOR methods dealing with triangular fuzzy numbers. They used fuzzy AHP to calculate weights of criteria which are served later as inputs for the fuzzy VIKOR method. The outcome of this work is to assist embedded designers to select the most appropriate embedded OS for efficient design of secure embedded systems.



Author(s):  
Samuel Jero ◽  
Juliana Furgala ◽  
Runyu Pan ◽  
Phani Kishore Gadepalli ◽  
Alexandra Clifford ◽  
...  


2020 ◽  
Vol 10 (9) ◽  
pp. 3125
Author(s):  
Saad Mubeen ◽  
Elena Lisova ◽  
Aneta Vulgarakis Feljan

Cyber Physical Systems (CPSs) are systems that are developed by seamlessly integrating computational algorithms and physical components, and they are a result of the technological advancement in the embedded systems and distributed systems domains, as well as the availability of sophisticated networking technology. Many industrial CPSs are subject to timing predictability, security and functional safety requirements, due to which the developers of these systems are required to verify these requirements during the their development. This position paper starts by exploring the state of the art with respect to developing timing predictable and secure embedded systems. Thereafter, the paper extends the discussion to time-critical and secure CPSs and highlights the key issues that are faced when verifying the timing predictability requirements during the development of these systems. In this context, the paper takes the position to advocate paramount importance of security as a prerequisite for timing predictability, as well as both security and timing predictability as prerequisites for functional safety. Moreover, the paper identifies the gaps in the existing frameworks and techniques for the development of time- and safety-critical CPSs and describes our viewpoint on ensuring timing predictability and security in these systems. Finally, the paper emphasises the opportunities that artificial intelligence can provide in the development of these systems.



Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 200
Author(s):  
Daniel Arumí ◽  
Salvador Manich ◽  
Álvaro Gómez-Pau ◽  
Rosa Rodríguez-Montañés ◽  
Víctor Montilla ◽  
...  

The ubiquitous use of critical and private data in electronic format requires reliable and secure embedded systems for IoT devices. In this context, RRAMs (Resistive Random Access Memories) arises as a promising alternative to replace current memory technologies. However, their suitability for this kind of application, where the integrity of the data is crucial, is still under study. Among the different typology of attacks to recover information of secret data, laser attack is one of the most common due to its simplicity. Some preliminary works have already addressed the influence of laser tests on RRAM devices. Nevertheless, the results are not conclusive since different responses have been reported depending on the circuit under testing and the features of the test. In this paper, we have conducted laser tests on individual RRAM devices. For the set of experiments conducted, the devices did not show faulty behaviors. These results contribute to the characterization of RRAMs and, together with the rest of related works, are expected to pave the way for the development of suitable countermeasures against external attacks.



Author(s):  
Ali Ahmadinia ◽  
Ahmed Saeed

As computing devices have become an almost integral part of our lives, security of systems and protection of the sensitive data are emerging as very important issues. This is particularly evident for embedded systems which are often deployed in unprotected environments and at the same time being constrained by limited resources. Security and trust have also become important considerations in the design of virtually all modern embedded systems as they are utilized in critical and sensitive applications such as in transportation, national infrastructure, military equipment, banking systems, and medical devices. The increase in software content and network connectivity has made them vulnerable to fast spreading software-based attacks such as viruses and worms, which were hitherto primarily the concern of personal computers, servers, and the internet. This chapter discusses the basic concepts, security attacks types, and existing preventive measures in the field of embedded systems and multi-core systems.



Sign in / Sign up

Export Citation Format

Share Document