ABSTRACT
No abstract available.
Recommendations
Embedded Software Assurance for Configuring Secure Hardware
The recent development of high-security processors and hardware is substantially changing embedded software tools, shedding light on security in the embedded development environment. The process of developing, certifying, and implementing a secure ...
Hardware security assurance in emerging IoT applications
2016 IEEE International Symposium on Circuits and Systems (ISCAS)The Internet of Things (IoT) offers a more advanced service than a single device or an isolated system, as IoT connects diverse components, such as sensors, actuators, and embedded devices through the internet. As predicted by Cisco, there will be 50 ...
Hardware Security Evaluation Using Assurance Case Models
ARES '15: Proceedings of the 2015 10th International Conference on Availability, Reliability and SecurityThe security of computing systems relies heavily on their hardware architecture. Currently, hardware is evaluated using mostly manual processes that are prone to errors, and generate a large, complex workload. In this paper, we are the first to report ...
Comments