
Proceedings Paper
Formal detection method for hardware vulnerabilities and trojan of embedded devicesFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
As become more widely used, embedded systems security has increasingly gained attention. From the hardware point
of view, this paper describes the background of approach to the vulnerabilities and hardware Trojan detection of
embedded system, basic ideas and objectives; established the model- ESM (Embedded Systems Model) used to describe
embedded systems, provides the encoding method of the ESM system state. Based on this model, this article describes
how to use model checking methods to detect vulnerabilities and Trojan existence of an embedded system.
Paper Details
Date Published: 4 March 2013
PDF: 5 pages
Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 876857 (4 March 2013); doi: 10.1117/12.2011959
Published in SPIE Proceedings Vol. 8768:
International Conference on Graphic and Image Processing (ICGIP 2012)
Zeng Zhu, Editor(s)
PDF: 5 pages
Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 876857 (4 March 2013); doi: 10.1117/12.2011959
Show Author Affiliations
Xiaodong Xie, Zhengzhou Institute of Information Science and Technology (China)
Qingbao Li, Zhengzhou Institute of Information Science and Technology (China)
Qingbao Li, Zhengzhou Institute of Information Science and Technology (China)
Xiaopeng Niu , Zhengzhou Institute of Information Science and Technology (China)
Published in SPIE Proceedings Vol. 8768:
International Conference on Graphic and Image Processing (ICGIP 2012)
Zeng Zhu, Editor(s)
© SPIE. Terms of Use
