Home > Research > Publications & Outputs > Embedded systems security
View graph of relations

Embedded systems security

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

Published

Standard

Embedded systems security. / Farooq-I-Azam, Muhammad; Naeem Ayyaz, Muhammad.
Cyber security standards, practices and industrial applications : systems and methodologies. Hershey, Pa.: IGI Global, 2011. p. 179-198.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

Harvard

Farooq-I-Azam, M & Naeem Ayyaz, M 2011, Embedded systems security. in Cyber security standards, practices and industrial applications : systems and methodologies. IGI Global, Hershey, Pa., pp. 179-198. https://doi.org/10.4018/978-1-60960-851-4.ch010

APA

Farooq-I-Azam, M., & Naeem Ayyaz, M. (2011). Embedded systems security. In Cyber security standards, practices and industrial applications : systems and methodologies (pp. 179-198). IGI Global. https://doi.org/10.4018/978-1-60960-851-4.ch010

Vancouver

Farooq-I-Azam M, Naeem Ayyaz M. Embedded systems security. In Cyber security standards, practices and industrial applications : systems and methodologies. Hershey, Pa.: IGI Global. 2011. p. 179-198 doi: 10.4018/978-1-60960-851-4.ch010

Author

Farooq-I-Azam, Muhammad ; Naeem Ayyaz, Muhammad. / Embedded systems security. Cyber security standards, practices and industrial applications : systems and methodologies. Hershey, Pa. : IGI Global, 2011. pp. 179-198

Bibtex

@inbook{353e154a598f42d88f1dcfbc3503d501,
title = "Embedded systems security",
abstract = "Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks. However, during the previous few years, it has been demonstrated that novel attacks against the hardware and embedded systems can also be mounted. Not only viruses, but worms and Trojan horses have been developed for them, and they have also been demonstrated to be effective. Whereas a lot of research has already been done in the area of security of general purpose computers and software applications, hardware and embedded systems security is a relatively new and emerging area of research. This chapter provides details of various types of existing attacks against hardware devices and embedded systems, analyzes existing design methodologies for their vulnerability to new types of attacks, and along the way describes solutions and countermeasures against them for the design and development of secure systems.",
author = "Muhammad Farooq-I-Azam and {Naeem Ayyaz}, Muhammad",
year = "2011",
doi = "10.4018/978-1-60960-851-4.ch010",
language = "English",
isbn = "9781609608538",
pages = "179--198",
booktitle = "Cyber security standards, practices and industrial applications",
publisher = "IGI Global",

}

RIS

TY - CHAP

T1 - Embedded systems security

AU - Farooq-I-Azam, Muhammad

AU - Naeem Ayyaz, Muhammad

PY - 2011

Y1 - 2011

N2 - Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks. However, during the previous few years, it has been demonstrated that novel attacks against the hardware and embedded systems can also be mounted. Not only viruses, but worms and Trojan horses have been developed for them, and they have also been demonstrated to be effective. Whereas a lot of research has already been done in the area of security of general purpose computers and software applications, hardware and embedded systems security is a relatively new and emerging area of research. This chapter provides details of various types of existing attacks against hardware devices and embedded systems, analyzes existing design methodologies for their vulnerability to new types of attacks, and along the way describes solutions and countermeasures against them for the design and development of secure systems.

AB - Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks. However, during the previous few years, it has been demonstrated that novel attacks against the hardware and embedded systems can also be mounted. Not only viruses, but worms and Trojan horses have been developed for them, and they have also been demonstrated to be effective. Whereas a lot of research has already been done in the area of security of general purpose computers and software applications, hardware and embedded systems security is a relatively new and emerging area of research. This chapter provides details of various types of existing attacks against hardware devices and embedded systems, analyzes existing design methodologies for their vulnerability to new types of attacks, and along the way describes solutions and countermeasures against them for the design and development of secure systems.

U2 - 10.4018/978-1-60960-851-4.ch010

DO - 10.4018/978-1-60960-851-4.ch010

M3 - Chapter (peer-reviewed)

SN - 9781609608538

SP - 179

EP - 198

BT - Cyber security standards, practices and industrial applications

PB - IGI Global

CY - Hershey, Pa.

ER -