7 research outputs found
Increasing the Trustworthiness of Embedded Applications
Embedded systems, by their nature, often run unattended with opportunistic rather then scheduled software upgrades and, perhaps most significantly, have long operational lifetimes, and, hence, provide excellent targets for massive and remote exploitation. Thus, such systems mandate higher assurances of trust and cyber-security compared to those presently available in State-of-the-Art ICT systems. In this poster we present some techniques we utilize in the SHARCS project to ensure a higher level of security for embedded systems
Alcatraz: An isolated environment for experimenting with untrusted software
10.1145/1455526.1455527ACM Transactions on Information and System Security12