D. G. Abraham, G. M. Dolan, G. P. Double, and J. V. Stevens, Transaction Security System, IBM Systems Journal, vol.30, issue.2, pp.206-228, 1991.
DOI : 10.1147/sj.302.0206

A. Agaskar, T. He, and L. Tong, Distributed Detection of Multi-Hop Information Flows With Fusion Capacity Constraints, IEEE Transactions on Signal Processing, vol.58, issue.6, pp.3373-3383, 2010.
DOI : 10.1109/TSP.2010.2044249

W. A. Arbaugh and L. Van-doorn, Embedded security: challenges and concerns, Computer, vol.34, issue.10, pp.40-41, 2001.
DOI : 10.1109/MC.2001.955096

C. Braghin, N. Sharygina, and K. Barone-adesi, A model checking-based approach for security policy verification of mobile systems, Formal Aspects of Computing, vol.24, issue.5, pp.627-648, 2011.
DOI : 10.1007/s00165-010-0159-y

URL : https://hal.archives-ouvertes.fr/hal-00618198

W. Burleson, S. S. Clark, B. Ransford, and K. Fu, Design challenges for secure implantable medical devices, Proceedings of the 49th Annual Design Automation Conference on, DAC '12, pp.12-17, 2012.
DOI : 10.1145/2228360.2228364

A. Chechulin, I. Kotenko, and V. Desnitsky, An Approach for Network Information Flow Analysis for Systems of Embedded Components, In: LNCS, vol.7531, pp.146-155, 2012.
DOI : 10.1007/978-3-642-33704-8_13

J. G. Cederquist, T. Dashti, and M. , An intruder model for verifying liveness in security protocols, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.23-32, 2006.
DOI : 10.1145/1180337.1180340

V. Desnitsky, I. Kotenko, and A. Chechulin, Configuration-Based Approach to Embedded Device Security, LNCS, vol.7531, pp.270-285, 2012.
DOI : 10.1007/978-3-642-33704-8_23

N. Dick and N. Mccallum, High-speed security, Communications Engineer, vol.2, issue.2, pp.37-39, 2004.
DOI : 10.1049/ce:20040207

M. Eisenring, L. Thiele, and E. Zitzler, Conflicting criteria in embedded system design, IEEE Design & Test of Computers, vol.17, issue.2, pp.51-59, 2000.
DOI : 10.1109/54.844334

J. Feigenbaum, M. J. Freedman, S. Tomas, and A. Shostack, Privacy Engineering for Digital Rights Management Systems, Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management, pp.76-105, 2001.
DOI : 10.1007/3-540-47870-1_6

G. Gogniat, T. Wolf, and W. Burleson, Reconfigurable Security Primitive for Embedded Systems, 2005 International Symposium on System-on-Chip, pp.23-28, 2005.
DOI : 10.1109/ISSOC.2005.1595635

URL : https://hal.archives-ouvertes.fr/hal-00089411

J. Grand, Practical Secure Hardware Design for Embedded Systems, Proceedings of the 2004 Embedded Systems Conference, 2004.

D. Hedin and A. Sabelfeld, A Perspective on Information-Flow. In: summer school Control Tools for Analysis and Verification of Software Safety and Security, 2011.

W. E. Juengst and M. Heinrich, Using resource balancing to configure modular systems, Intelligent Systems and their Applications, pp.50-58, 1998.
DOI : 10.1109/5254.708433

M. Knezevic, V. Rozic, and I. Verbauwhede, Design Methods for Embedded Security, In: Telfor Journal, vol.1, issue.2, 2009.

P. Kocher, R. Lee, G. Mcgraw, R. , and S. , Security as a new dimension in embedded system design, Proceedings of the 41st Design Automation Conference, pp.753-760, 2004.

O. Kommerling and M. G. Kuhn, Design principles for tamper-resistant smartcard processors, Proceedings of the USENIX Workshop on Smartcard Technology, pp.9-20, 1999.

P. Koopman, Embedded system security, Computer, vol.37, issue.7, 2004.
DOI : 10.1109/MC.2004.52

I. Kotenko and O. Polubelova, Verification of security policy filtering rules by Model Checking, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, pp.706-710, 2011.
DOI : 10.1109/IDAACS.2011.6072862

M. Object and . Group, The UML Profile for MARTE: Modeling and Analysis of Real-Time and Embedded Systems, 2011.

B. R. Moyers, J. P. Dunning, R. C. Marchany, and T. J. , Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices, 2010 43rd Hawaii International Conference on System Sciences, pp.1-9, 2010.
DOI : 10.1109/HICSS.2010.170

W. Pieters and L. Coles-kemp, Reducing normative conflicts in information security, Proceedings of the 2011 workshop on New security paradigms workshop, NSPW '11, pp.11-24, 2011.
DOI : 10.1145/2073276.2073279

M. Pistoia, S. Chandra, S. Fink, Y. , and E. , A survey of static analysis methods for identifying security vulnerabilities in software systems, IBM Systems Journal, vol.46, issue.2, 2007.
DOI : 10.1147/sj.462.0265

A. J. Rae and L. P. Wildman, A Taxonomy of Attacks on Secure Devices In: Australian Information Warfare and IT Security, pp.251-264, 2003.

A. Rae and C. Fidge, Identifying Critical Components during Information Security Evaluations, Journal of Research and Practice in Information Technology, pp.391-402, 2005.

S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, Security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.3, issue.3, pp.461-491, 2004.
DOI : 10.1145/1015047.1015049

J. F. Ruiz, R. Harjani, A. Maña, V. Desnitsky, I. Kotenko et al., A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components, 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing
DOI : 10.1109/PDP.2012.36

J. F. Ruiz, A. Rein, M. Arjona, A. Mana, A. Monsifrot et al., Security Engineering and Modelling of Set-Top Boxes, 2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom), pp.113-122, 2012.
DOI : 10.1109/BioMedCom.2012.25

D. Sabin and R. Weigel, Product configuration frameworks-a survey, Intelligent Systems and their Applications IEEE Computer Society, pp.42-49, 1998.
DOI : 10.1109/5254.708432

. Secfutur, Design of Secure and energy-efficient embedded systems for Future internet applications, FP7 Project Web site

A. Sprintson, S. El-rouayheb, and C. Georghiades, A New Construction Method for Networks from Matroids, Proceedings of the 2009 Symposium on Information Theory, 2009.

Z. Wang, R. Johnson, R. Murmuria, and A. Stavrou, Exposing Security Risks for Commercial Mobile Devices, Computer Network Security, pp.3-5, 2012.
DOI : 10.1007/978-3-642-33704-8_2

G. Wei and Y. Qin, An Approach of Product Configuration Based on Decision Tree and Minimum Conflicts Repair Algorithm, 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, pp.126-129, 2009.
DOI : 10.1109/ICIII.2009.37

B. Yu and H. J. Skovgaard, A Configuration Tool to Increase Product Competitiveness, IEEE Intelligent Systems 13, pp.34-41, 1998.