2016 International Conference on Development and Application Systems (DAS) 2016
DOI: 10.1109/daas.2016.7492565
|View full text |Cite
|
Sign up to set email alerts
|

Secure embedded architectures: Taint properties verification

Abstract: Nowadays embedded devices collect various kinds of information and provide it to communication networks for further processing. These devices often provide critical functionalities that could be exploited by malicious parties. Using formal techniques is a natural way to increase the confidence in the overall embedded system security. However, the major research focus is on verifying only the correctness of encryption algorithms and their implementation in software and hardware and not the whole security proces… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…This was further developed in [25] and a portfolio of different taint properties in the CTL language was created. In order to formulate the properties in CTL, certain assumptions about the attack are required which significantly restrict the coverage of the method.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This was further developed in [25] and a portfolio of different taint properties in the CTL language was created. In order to formulate the properties in CTL, certain assumptions about the attack are required which significantly restrict the coverage of the method.…”
Section: Related Workmentioning
confidence: 99%
“…The use of formal techniques for security verification in hardware was pioneered in [24], [25], [26] by adopting the idea of taint analysis which originally comes from the software domain. This is the research which is the most closely related to our work.…”
Section: Related Workmentioning
confidence: 99%
“…Further notable research on adapting software taint analysis in the hardware domain, in order to detect security vulnerabilities, has been pioneered in [34][35][36].…”
mentioning
confidence: 99%