4 March 2013 Formal detection method for hardware vulnerabilities and Trojan of embedded devices
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 876857 (2013) https://doi.org/10.1117/12.2011959
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
As become more widely used, embedded systems security has increasingly gained attention. From the hardware point of view, this paper describes the background of approach to the vulnerabilities and hardware Trojan detection of embedded system, basic ideas and objectives; established the model- ESM (Embedded Systems Model) used to describe embedded systems, provides the encoding method of the ESM system state. Based on this model, this article describes how to use model checking methods to detect vulnerabilities and Trojan existence of an embedded system.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiaodong Xie, Xiaodong Xie, Qingbao Li, Qingbao Li, Xiaopeng Niu , Xiaopeng Niu , } "Formal detection method for hardware vulnerabilities and Trojan of embedded devices", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 876857 (4 March 2013); doi: 10.1117/12.2011959; https://doi.org/10.1117/12.2011959
PROCEEDINGS
5 PAGES


SHARE
RELATED CONTENT

ASN reputation system model
Proceedings of SPIE (May 13 2015)
Optical asymmetric encryption schemes and attack analysis
Proceedings of SPIE (October 08 2018)
Integrated mandatory access control for digital data
Proceedings of SPIE (March 16 2008)
Combinatorial analysis of network security
Proceedings of SPIE (March 07 2002)

Back to Top