2020
DOI: 10.1016/j.cose.2019.101615
|View full text |Cite
|
Sign up to set email alerts
|

A security modeling and verification method of embedded software based on Z and MARTE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…The process is divided into three main steps as given below. We can extract useful information from the device such as serial number, device name, access specifier and encryption status [9][10][11]. This process checks whether the device is rooted or not henceforth gaining some privileges.…”
Section: Static Analysis Of Appsmentioning
confidence: 99%
“…The process is divided into three main steps as given below. We can extract useful information from the device such as serial number, device name, access specifier and encryption status [9][10][11]. This process checks whether the device is rooted or not henceforth gaining some privileges.…”
Section: Static Analysis Of Appsmentioning
confidence: 99%