Security and Embedded Systems ( NATO Security through Science Series - D: Information and Communication Security )

Publication series : NATO Security through Science Series - D: Information and Communication Security

Author: Serpanos D.N.;Giladi R.  

Publisher: Ios Press‎

Publication year: 2006

E-ISBN: 9781607501558

P-ISBN(Paperback): 9781586035808

Subject: TP3 Computers

Keyword: 计算技术、计算机技术

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Technological advances have led to wide deployment and use of embedded systems in an increasing range of applications, from mobile phones to car, plane and spacecraft and from digital id’s to military systems in the field. Many of these applications place significant security requirements and have led to significant research activity in the area of security and embedded systems, due to the limited resources of conventional embedded systems. This emerging research area is of great importance to a large number of public and private organizations, due to their desire to deploy secure embedded systems in the field. This publication brings together one of the first international efforts to emphasize the importance of this emerging technical field and provides presentations of leading researchers in the field. Its objectives are to present the technologies and open problems of the emerging area of security and embedded systems, to present the latest research results in all aspects of security in embedded systems, and, finally, to provide a roadmap of the technology for the future. Considering the main directions of research in the field, three main areas are discussed: (i) foundations of security and embedded systems, (ii) secure embedded computing systems and (iii) telecommunications and network services.

Chapter

Computational Improvements to Differential Side Channel Analysis

A Process Algebra Approach to Authentication and Secrecy

Intellectual Property Protection Using Embedded Systems

Challenges in Deeply Networked System Survivability

Multimedia Watermarking

A Platform for Designing Secure Embedded Systems

Cryptographic Insecurity of the Test & Repeat Paradigm

A Privacy Classification Model Based on Linkability Valuation

A Run-Time Reconfigurable Architecture for Embedded Program Flow Verification

Model-Based Validation of Enterprise Access Policies

Research Issues in Homeland Security

Assurance in Autonomous Decentralized Embedded System

Vulnerabilities and Countermeasures for Embedded Processors

Agent-Based Modeling and Simulation of Malefactors' Attacks Against Computer Networks

Current Problems in Security of Military Networks

Multi-Agent Framework for Intrusion Detection and Alert Correlation

Securing Home and Building Automation Systems Using the zPnP Approach

REWARD: A Routing Method for Ad-Hoc Networks with Adjustable Security Capability

On the Security of the GSM Cellular Network

Telecommunications Fraud & Electronic Crime in Fix and Mobile Embedded Systems

Author Index

The users who browse this book also browse