Sciweavers

11603 search results - page 12 / 2321
» Embedded System Security
Sort
View
85
Voted
ACSAC
2005
IEEE
15 years 5 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner
87
Voted
ACSAC
2003
IEEE
15 years 3 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
TCS
2010
14 years 10 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
13 years 11 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
DKE
2002
130views more  DKE 2002»
14 years 11 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber