Paper
4 March 2013 Formal detection method for hardware vulnerabilities and Trojan of embedded devices
Xiaodong Xie, Qingbao Li, Xiaopeng Niu
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 876857 (2013) https://doi.org/10.1117/12.2011959
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
As become more widely used, embedded systems security has increasingly gained attention. From the hardware point of view, this paper describes the background of approach to the vulnerabilities and hardware Trojan detection of embedded system, basic ideas and objectives; established the model- ESM (Embedded Systems Model) used to describe embedded systems, provides the encoding method of the ESM system state. Based on this model, this article describes how to use model checking methods to detect vulnerabilities and Trojan existence of an embedded system.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiaodong Xie, Qingbao Li, and Xiaopeng Niu "Formal detection method for hardware vulnerabilities and Trojan of embedded devices", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 876857 (4 March 2013); https://doi.org/10.1117/12.2011959
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Electronic support measures

Embedded systems

Systems modeling

Information security

Computer security

Logic

Analytical research

Back to Top