Increasing the Trustworthiness of Embedded Applications
Paper i proceeding, 2015

Embedded systems, by their nature, often run unattended with opportunistic rather then scheduled software upgrades and, perhaps most significantly, have long operational lifetimes, and, hence, provide excellent targets for massive and remote exploitation. Thus, such systems mandate higher assurances of trust and cyber-security compared to those presently available in State-of-the-Art ICT systems. In this poster we present some techniques we utilize in the SHARCS project to ensure a higher level of security for embedded systems.

Control flow integrity

SHARCS

Embedded systems

Security-by-design

Security

Instruction set randomization (ISR)

Författare

E. Athanasopoulos

Foundation for Research and Technology Hellas (FORTH)

M. Boehner

Elektrobit Automotive GmbH

C. Giuffrida

VU University Amsterdam

D. Pidan

IBM Israel Ltd

V. Prevelakis

Technische Universität Braunschweig

Ioannis Sourdis

Chalmers, Data- och informationsteknik, Datorteknik

C. Strydis

NEURASMUS BV

J. Thomson

OnApp Limited

Lecture Notes in Computer Science

0302-9743 (ISSN)

Vol. 9229 321-322

DOI

10.1007/978-3-319-22846-4

ISBN

978-3-319-22846-4