Increasing the trustworthiness of embedded applications

Elias Athanasopoulos, Martin Boehner, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis*, Ioannis Sourdis, Christos Strydis, John Thomson

*Corresponding author for this work

Research output: Chapter/Conference proceedingConference proceedingAcademicpeer-review


Embedded systems, by their nature, often run unattended with opportunistic rather then scheduled software upgrades and, perhaps most significantly, have long operational lifetimes, and, hence, provide excellent targets for massive and remote exploitation. Thus, such systems mandate higher assurances of trust and cyber-security compared to those presently available in State-of-the-Art ICT systems. In this poster we present some techniques we utilize in the SHARCS project to ensure a higher level of security for embedded systems.

Original languageEnglish
Title of host publicationTrust and Trustworthy Computing - 8th International Conference, TRUST 2015, Proceedings
EditorsMauro Conti, Matthias Schunter, Ioannis Askoxylakis
Number of pages2
ISBN (Print)9783319228457
Publication statusPublished - 2015
Event8th International Conference on Trust and Trustworthy Computing, TRUST 2015 - Heraklion, Greece
Duration: 24 Aug 201526 Aug 2015

Publication series

SeriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)


Conference8th International Conference on Trust and Trustworthy Computing, TRUST 2015

Bibliographical note

Publisher Copyright:
© Springer International Publishing Switzerland 2015.


Dive into the research topics of 'Increasing the trustworthiness of embedded applications'. Together they form a unique fingerprint.

Cite this