Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions - Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
Conference Papers Year : 2010

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

Abstract

Most modern embedded systems include an operating system. Not all functions in the operating systems have to fulfill the same security requirements. In this work we propose a mechanism to identify and maintain functions that have to meet strict security needs. This mechanism is based on annotations representing security constrains and assertions to check these security annotations during the verification phase of the system under development.
Fichier principal
Vignette du fichier
60330319.pdf (187.1 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01056075 , version 1 (14-08-2014)

Licence

Identifiers

Cite

Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner. Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.316-323, ⟨10.1007/978-3-642-12368-9_25⟩. ⟨hal-01056075⟩
149 View
137 Download

Altmetric

Share

More