Abstract
Embedded systems, by their nature, often run unattended with opportunistic rather then scheduled software upgrades and, perhaps most significantly, have long operational lifetimes, and, hence, provide excellent targets for massive and remote exploitation. Thus, such systems mandate higher assurances of trust and cyber-security compared to those presently available in State-of-the-Art ICT systems. In this poster we present some techniques we utilize in the SHARCS project to ensure a higher level of security for embedded systems.
Original language | English |
---|---|
Title of host publication | Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Proceedings |
Editors | Mauro Conti, Matthias Schunter, Ioannis Askoxylakis |
Publisher | Springer-Verlag |
Pages | 321-322 |
Number of pages | 2 |
ISBN (Print) | 9783319228457 |
Publication status | Published - 2015 |
Event | 8th International Conference on Trust and Trustworthy Computing, TRUST 2015 - Heraklion, Greece Duration: 24 Aug 2015 → 26 Aug 2015 |
Publication series
Series | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 9229 |
ISSN | 0302-9743 |
Conference
Conference | 8th International Conference on Trust and Trustworthy Computing, TRUST 2015 |
---|---|
Country/Territory | Greece |
City | Heraklion |
Period | 24/08/15 → 26/08/15 |
Bibliographical note
Publisher Copyright:© Springer International Publishing Switzerland 2015.