Back to Results
First PageMeta Content
Computer network security / Software bugs / Hacking / Software testing / Side channel attack / Vulnerability / Uncontrolled format string / Power analysis / Embedded system / Cyberwarfare / Computer security / Security


Des Autom Embed Syst[removed]: 173–183 DOI[removed]s10617[removed]x Embedded systems security—an overview Sri Parameswaran · Tilman Wolf
Add to Reading List

Document Date: 2013-12-04 11:29:25


Open Document

File Size: 256,66 KB

Share Result on Facebook

City

San Francisco / Austin / New York / Paris / Washington / DC / Berlin / Washington / London / San Diego / /

Company

Feyt N (2001) Hardware / Jovanov E (2005) Hardware / Wolf T (2007) Hardware / Springer Science+Business Media LLC / Wikipedia Foundation Inc. / Kia / Hofmeyr SA / the AES / /

Continent

Europe / /

Country

France / United States / Australia / /

/

Facility

University of New South Wales / Carnegie Mellon University / University of Massachusetts / /

IndustryTerm

secure processor / software symbiosis / software integrity / electronic media / secure embedded systems / security applications / communications security / appropriate solution / hardware/software / Energy drainage / non-deterministic processors / software encryption / level applications / cryptographic algorithm / low-level software / secure processing / manufacturing knowledge / level protocols / cryptographic protocols / microprocessor chips / conventional computer systems / software applications / instruction-set processors / application-specific systems / cryptographic hardware / safety-critical systems / information technology / software code / computing / chemical means / low-energy / software attacks / electricity meter / security solutions / /

NaturalFeature

Instruction stream / Side channel / /

OperatingSystem

Unix / Linux / /

Organization

S. Parameswaran School of Computer Science and Engineering / University of Massachusetts / Amherst / USENIX Association / CERT Coordination Center / Monterey / ASIC / University of New South Wales / Sydney / Department of Electrical and Computer Engineering / Department of Computer Science / Carnegie Mellon University / IEEE Computer Society / /

Person

Rao JR / Roshan Ragel / Angelo Ambrose / Jorgen Peddersen / /

Position

Butler / Bishop / Designer / /

Product

Code injection / /

ProgrammingLanguage

Java / R / DC / ML / C++ / /

ProvinceOrState

New York / Washington / New South Wales / California / Massachusetts / /

PublishedMedium

Cryptology ePrint Archive / /

Region

South Wales / /

Technology

Unix / Linux / information technology / specific instruction-set processors / smart card / Mobile Phones / instant messaging / secret key / DSP processor / Operating system / html / operating systems / Integrated circuits / cryptographic algorithm / encryption / Cryptography / ASIC / Public Key / Java / system-on-chip / high-level protocols / non-deterministic processors / secure processor / http / software encryption / PDA / microprocessor chips / /

URL

http /

SocialTag