Security and Embedded Systems
Ran Giladi, Dimitrios Nikolaou Serpanos
IOS Press, 2006 - Science - 203 pages
Technological advances have led to wide deployment and use of embedded systems in an increasing range of applications, from mobile phones to car, plane and spacecraft and from digital id s to military systems in the field. Many of these applications place significant security requirements and have led to significant research activity in the area of security and embedded systems, due to the limited resources of conventional embedded syst+S37ems. This emerging research area is of great importance to a large number of public and private organizations, due to their desire to deploy secure embedded systems in the field. This publication brings together one of the first international efforts to emphasize the importance of this emerging technical field and provides presentations of leading researchers in the field. Its objectives are to present the technologies and open problems of the emerging area of security and embedded systems, to present the latest research results in all aspects of security in embedded systems, and, finally, to provide a roadmap of the technology for the future. Considering the main directions of research in the field, three main areas are discussed: (i) foundations of security and embedded systems, (ii) secure embedded computing systems and (iii) telecommunications and network services.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Architectural Enhancements for Secure Embedded Processing
A Process Algebra Approach to Authentication and Secrecy
5 other sections not shown
Other editions - View all
agent class algorithm analysis application approach architecture authentication basic block bits buffer calculated communication compression computer network Computer Science configuration content provider cryptographic cryptosystem curves D.N. Serpanos decryption devices Digital Rights Management DVFS DVFS scheduler embedded systems encryption enterprise example execution Figure function game tree Giladi Eds H&BAS hardware IEEE implementation initial input interface Internet intrusion detection IOS Press keystream known-plaintext attack Lecture Notes memory mobile phone module multimedia nodes nonce Notes in Computer operation OSPF packet parameters PE-router performance plaintext platform policies power traces private key problem Proc processor proposed protocol public key random route router S-box scenarios sensor server simulation smart card Spi calculus strategies Suica tion trained to detect vulnerabilities watermarking zPnP