Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

Abstract : Most modern embedded systems include an operating system. Not all functions in the operating systems have to fulfill the same security requirements. In this work we propose a mechanism to identify and maintain functions that have to meet strict security needs. This mechanism is based on annotations representing security constrains and assertions to check these security annotations during the verification phase of the system under development.
Type de document :
Communication dans un congrès
Pierangela Samarati; Michael Tunstall; Joachim Posegga; Konstantinos Markantonakis; Damien Sauveron. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. Springer, Lecture Notes in Computer Science, LNCS-6033, pp.316-323, 2010, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. 〈10.1007/978-3-642-12368-9_25〉
Liste complète des métadonnées

Littérature citée [10 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01056075
Contributeur : Hal Ifip <>
Soumis le : jeudi 14 août 2014 - 18:02:01
Dernière modification le : vendredi 11 août 2017 - 15:13:04
Document(s) archivé(s) le : jeudi 27 novembre 2014 - 01:37:40

Fichier

60330319.pdf
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner. Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. Pierangela Samarati; Michael Tunstall; Joachim Posegga; Konstantinos Markantonakis; Damien Sauveron. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. Springer, Lecture Notes in Computer Science, LNCS-6033, pp.316-323, 2010, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. 〈10.1007/978-3-642-12368-9_25〉. 〈hal-01056075〉

Partager

Métriques

Consultations de la notice

130

Téléchargements de fichiers

113