Skip to Main content Skip to Navigation
Conference papers

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

Abstract : Most modern embedded systems include an operating system. Not all functions in the operating systems have to fulfill the same security requirements. In this work we propose a mechanism to identify and maintain functions that have to meet strict security needs. This mechanism is based on annotations representing security constrains and assertions to check these security annotations during the verification phase of the system under development.
Document type :
Conference papers
Complete list of metadata

Cited literature [10 references]  Display  Hide  Download

https://hal.inria.fr/hal-01056075
Contributor : Hal Ifip <>
Submitted on : Thursday, August 14, 2014 - 6:02:01 PM
Last modification on : Friday, August 11, 2017 - 3:13:04 PM
Long-term archiving on: : Thursday, November 27, 2014 - 1:37:40 AM

File

60330319.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner. Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.316-323, ⟨10.1007/978-3-642-12368-9_25⟩. ⟨hal-01056075⟩

Share

Metrics

Record views

366

Files downloads

322