2010
DOI: 10.1007/978-3-642-12368-9_25
|View full text |Cite
|
Sign up to set email alerts
|

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

Abstract: Abstract. Most modern embedded systems include an operating system. Not all functions in the operating systems have to fulfill the same security requirements. In this work we 1 propose a mechanism to identify and maintain functions that have to meet strict security needs. This mechanism is based on annotations representing security constrains and assertions to check these security annotations during the verification phase of the system under development.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…In addition, Loining et al [229] used the Java annotations to ensure a secure and reliable development of applications for embedded devices (e.g. smart cards).…”
Section: Runtime Protection Mechanismmentioning
confidence: 99%