An approach for network information flow analysis for systems of embedded components

7Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Systems (devices) with embedded components operate in a potentially hostile environment and have strong recourse limitations. The development of security-enhanced embedded components is a complicated task owning to different types of threats and attacks that may affect the device, and because the security in embedded devices is commonly provided as an additional feature at the final stages of the development process, or even neglected. In the paper we consider an approach to analysis of network information flows in systems containing embedded components. This approach helps to the system engineer to evaluate the embedded system from security point of view and to correct the architecture of future system on early stages of the development. © 2012 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Chechulin, A., Kotenko, I., & Desnitsky, V. (2012). An approach for network information flow analysis for systems of embedded components. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7531 LNCS, pp. 146–155). Springer Verlag. https://doi.org/10.1007/978-3-642-33704-8_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free