2019 32nd IEEE International System-on-Chip Conference (SOCC) 2019
DOI: 10.1109/socc46988.2019.1570548325
|View full text |Cite
|
Sign up to set email alerts
|

Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure

Abstract: The mass integration and deployment of intelligent technologies within critical commercial, industrial and public environments have a significant impact on business operations and society as a whole. Though integration of these critical intelligent technologies pose serious embedded security challenges for technology manufacturers which are required to be systematically approached, in-line with international security regulations. This paper establish security foundation for such intelligent technologies by der… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

5
0

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…To approach these diverse security challenges, there is a need for secure-by-design active-defence platform architecture rather than an afterthought [1], [2], [3], [4]. This needs active defences [3], [8], [9], [10] embedded within the platform's hardware and software stack complimenting each other.…”
Section: Secure-by-design and Security Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…To approach these diverse security challenges, there is a need for secure-by-design active-defence platform architecture rather than an afterthought [1], [2], [3], [4]. This needs active defences [3], [8], [9], [10] embedded within the platform's hardware and software stack complimenting each other.…”
Section: Secure-by-design and Security Methodsmentioning
confidence: 99%
“…It is evident that the vast majority of software security methods are not able to circumvent the explosion of security vulnerabilities and attacks launched by malicious actors. Because, they are often ad-hoc and passive, designed to mitigate a certain class of known attacks [2], [3], [4]. As they are not targeted to fix the root-causes of the underlying platform security architecture, rather focused circumvent the vulnerability itself or poor use of secure-design practices.…”
Section: Hex-five Multizone Securitymentioning
confidence: 99%
See 3 more Smart Citations