Share Email Print
cover

Proceedings Paper

Formal detection method for hardware vulnerabilities and trojan of embedded devices
Author(s): Xiaodong Xie; Qingbao Li; Xiaopeng Niu
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

As become more widely used, embedded systems security has increasingly gained attention. From the hardware point of view, this paper describes the background of approach to the vulnerabilities and hardware Trojan detection of embedded system, basic ideas and objectives; established the model- ESM (Embedded Systems Model) used to describe embedded systems, provides the encoding method of the ESM system state. Based on this model, this article describes how to use model checking methods to detect vulnerabilities and Trojan existence of an embedded system.

Paper Details

Date Published: 4 March 2013
PDF: 5 pages
Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 876857 (4 March 2013); doi: 10.1117/12.2011959
Show Author Affiliations
Xiaodong Xie, Zhengzhou Institute of Information Science and Technology (China)
Qingbao Li, Zhengzhou Institute of Information Science and Technology (China)
Xiaopeng Niu , Zhengzhou Institute of Information Science and Technology (China)


Published in SPIE Proceedings Vol. 8768:
International Conference on Graphic and Image Processing (ICGIP 2012)
Zeng Zhu, Editor(s)

© SPIE. Terms of Use
Back to Top
PREMIUM CONTENT
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?
close_icon_gray