2018 IEEE Conference on Dependable and Secure Computing (DSC) 2018
DOI: 10.1109/desec.2018.8625140
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…When compared to other mosquito-borne diseases, the symptoms are mild to moderate. There is an incubation period of around 5 days for the virus [ 32 ]. If the symptoms linger for more than 7days, the individual should consult for an early prediction approach that employs our suggested method.…”
Section: Resultsmentioning
confidence: 99%
“…When compared to other mosquito-borne diseases, the symptoms are mild to moderate. There is an incubation period of around 5 days for the virus [ 32 ]. If the symptoms linger for more than 7days, the individual should consult for an early prediction approach that employs our suggested method.…”
Section: Resultsmentioning
confidence: 99%
“…To approach these diverse security challenges, there is a need for secure-by-design active-defence platform architecture rather than an afterthought [1], [2], [3], [4]. This needs active defences [3], [8], [9], [10] embedded within the platform's hardware and software stack complimenting each other. These defence mechanisms facilitate detection of malicious activities, initiate active respond against these activities and recover the platform and its services back to its trusted secure state [2], [3].…”
Section: Secure-by-design and Security Methodsmentioning
confidence: 99%
“…These defence mechanisms can facilitate designing detect, respond and recover functions in case of malicious activity, software malfunction or adversarial attack [3], [4], [8], [9]. Since such incidents cause severe damage to the business reputation and safety of their users, the need for strong and robust platform security has become an obligatory design and operational security requirement for nextgeneration intelligent embedded technologies [3], [2], [10].…”
Section: Introductionmentioning
confidence: 99%
“…In embedded domain this process is well established which involves creating an abstraction of the embedded system [24] known as Threat and Security Modelling [25], [26]. This builds profiles of a potential attacker, their goals and methods, which then used to define and deploy countermeasures either to mitigate, minimise the impact of the attack or making less attractive for an attacker.…”
Section: Security Requirements Of Cyber Resilient Embedded Systemmentioning
confidence: 99%