Entity

Time filter

Source Type


Sharma S.,Center for Advanced Training
Proceedings - 2013 International Conference on Communication Systems and Network Technologies, CSNT 2013 | Year: 2013

The rapidly shrinking size of processor chips and memory, coupled with increasing speed and processing elements, has enabled widespread usage of embedded systems running software code, for the overall control and monitoring of larger systems. These embedded systems have proliferated in almost all the modern electronic equipment used in industries, home, automobiles, military battlefields, space or personal consumer electronic systems. The omnipresent and pervasive computing enabled by these embedded systems controlling/monitoring a wide array of complex networked or independent systems, need to be dependable and safe. With mass proliferation, the security of embedded systems presents a unique set of requirements and challenges. It is therefore important to study and assess the potential risks, threat vectors, potential adversaries/attackers and attack methodologies in order to effectively incorporate security in technology and processes right from the conceptual/design stages. The identification and analysis of the threats, vulnerabilities and study of risk mitigation methods, potential attackers and common attack methodologies is critical in implementing security measures in design, development, exploitation and final disposal phases of the embedded system. © 2013 IEEE. Source

Discover hidden collaborations