首页> 外文会议>ICCEE 2010;International conference on computer and electrical engineering >Formal Detection Method for Hardware Vulnerabilities and Trojan of Embedded Devices
【24h】

Formal Detection Method for Hardware Vulnerabilities and Trojan of Embedded Devices

机译:嵌入式设备硬件漏洞和木马的形式化检测方法

获取原文

摘要

As become more widely used, embedded systems security has increasingly gained attention. From the hardware point of view, this paper describes the background of approach to the vulnerabilities and hardware Trojan detection of embedded system, basic ideas and objectives; established the model- ESM (Embedded Systems Model) used to describe embedded systems, provides the encoding method of the ESM system state. Based on this model, this article describes how to use model checking methods to detect vulnerabilities and Trojan existence of an embedded system.
机译:随着越来越广泛的使用,嵌入式系统的安全性越来越受到关注。从硬件的角度,本文介绍了嵌入式系统中漏洞和硬件木马检测方法的背景,基本思想和目标。建立了用于描述嵌入式系统的模型-ESM(嵌入式系统模型),提供了ESM系统状态的编码方法。基于此模型,本文介绍如何使用模型检查方法来检测嵌入式系统的漏洞和特洛伊木马。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号