Open Access Open Access  Restricted Access Subscription Access

Security For Physical Component In Embedded System

Afiya Firdouse, Asharani ., Muskan Tahura

Abstract


Embedded systems, for which technological de- velopments appear to occur with a degree of "news almost every day," are becoming more and more important in our daily lives.There is a computer system everywhere, whether it is found in smart household appliances and smartphones or in industrial control systems and automobile electronics.None the less, as people become accustomed to the present, they are calling for stronger security measures to guard against changing online risks.The process of creating secure embed- ded systems has changed significantly during the last ten years.Since embedded devices were primarily used in isolation, they did not communicate with other devices and were therefore not vulnerable to outside threats. This paradigm was the norm until the emergence of the Internet of Things (IoT), but it has since undergone a radical shift.


Full Text:

PDF

References


Arman Pouraghily, Tilman Wolf and Russell Tessier, “Hardware Support for Embedded Operating System Security”, IEEE 2017.

Internet of Things: Privacy Security in a Connected World, Federal Trade Commission, Jan. 2015.

D. E. Sanger and N. Perlroth, “A new era of internet attacks powered by everyday devices,” The New York Times, Oct. 2016.

T. Jaeger, Ed., Operating System Security. Morgan and Claypool, 2008.

G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas, “Secure program execution via dynamic information flow tracking,” in ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, Boston, MA, Oct.2004, pp. 85–96.

N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan,

G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August, “RIFLE: An architectural framework for user-centric information-flow security,” in Proc. of 37th International Symposium on Microarchitecture, Portland, OR, Dec. 2004, pp. 243–254.

A. Waksman and S. Sethumadhavan, “Tamper evident microprocessors,” in Proc. of IEEE Symposium on Se- curity and Privacy, Oakland, CA, May 2010, pp. 173–188.

R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, “A fast automaton-based method for detecting anomalous program behaviors,” in Proc. Of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2001, pp. 144– 155.

D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha, “Se- cure embedded processing through hardware-assisted runtime monitoring,” in Proc. Of the Design, Automa- tion and Test in Europe Conference and Exhibition (DATE’05), Munich, Germany, Mar. 2005, pp. 178–183.

S. K. Hu, H. Chandrikakutty, Z. Goodman, R. Tessier, and T. Wolf, “Dynamic hardware monitors for network processor protection,” IEEE Transactions on Comput- ers, vol. 65, no. 3, pp. 860–872, Mar. 2016.


Refbacks

  • There are currently no refbacks.