Affiliation:
1. California State University – San Marcos, USA
2. COMSATS Institute of Information Technology, Pakistan
Abstract
As computing devices have become an almost integral part of our lives, security of systems and protection of the sensitive data are emerging as very important issues. This is particularly evident for embedded systems which are often deployed in unprotected environments and at the same time being constrained by limited resources. Security and trust have also become important considerations in the design of virtually all modern embedded systems as they are utilized in critical and sensitive applications such as in transportation, national infrastructure, military equipment, banking systems, and medical devices. The increase in software content and network connectivity has made them vulnerable to fast spreading software-based attacks such as viruses and worms, which were hitherto primarily the concern of personal computers, servers, and the internet. This chapter discusses the basic concepts, security attacks types, and existing preventive measures in the field of embedded systems and multi-core systems.
Reference38 articles.
1. Akritidis, P., Costa, M., Castro, M., & Hand, S. (2009). Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. In USENIX Security Symposium (pp. 51–66). Academic Press.
2. AMD. (2004). Intel put antivirus tech into chips | ZDNet. Retrieved September 13, 2017, from http://www.zdnet.com/article/amd-intel-put-antivirus-tech-into-chips/
3. Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
4. Efficient detection of all pointer and array access errors