Increasing the Trustworthiness of Embedded Applications
Paper i proceeding, 2015

Embedded systems, by their nature, often run unattended with opportunistic rather then scheduled software upgrades and, perhaps most significantly, have long operational lifetimes, and, hence, provide excellent targets for massive and remote exploitation. Thus, such systems mandate higher assurances of trust and cyber-security compared to those presently available in State-of-the-Art ICT systems. In this poster we present some techniques we utilize in the SHARCS project to ensure a higher level of security for embedded systems.

Instruction set randomization (ISR)

Embedded systems

SHARCS

Security

Security-by-design

Control flow integrity

Författare

E. Athanasopoulos

Idryma Technologias kai Erevnas (FORTH)

M. Boehner

Elektrobit Automotive

C. Giuffrida

Vrije Universiteit Amsterdam

D. Pidan

IBM Israel - Science and Technology

V. Prevelakis

Technische Universität Braunschweig

Ioannis Sourdis

Chalmers, Data- och informationsteknik, Datorteknik

C. Strydis

Neurasmus

J. Thomson

OnApp

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

03029743 (ISSN) 16113349 (eISSN)

Vol. 9229 321-322
978-3-319-22846-4 (ISBN)

Ämneskategorier

Datavetenskap (datalogi)

DOI

10.1007/978-3-319-22846-4

Mer information

Senast uppdaterat

2024-05-24