Abstract: "Embedded systems are deployed ubiquitously
among various sectors including automotive, medical, robotics
and avionics. As these devices become increasingly connected,
the attack surface also increases tremendously; new mechanisms
must be deployed to defend against more sophisticated a...
Thread
Stories related to "CheriRTOS: A Capability Model for Embedded Devices" across the full archive.
Abstract: "Embedded systems are deployed ubiquitously
among various sectors including automotive, medical, robotics
and avionics. As these devices become increasingly connected,
the attack surface also increases tremendously; new mechanisms
must be deployed to defend against more sophisticated a...
Model-Driven Performance Evaluation and Formal Verification for Multi-level Embedded System Design
(hal.upmc.fr)
Abstract: "The design methodology of an embedded system should start with a system-level partitioning dividing functions into hardware and software. However, since this partitioning decision is taken at a high level of abstraction, we propose regularly validating the selected partitioning during sof...
Internet Census 2012: Port scanning all IPv4 adresses using insecure embedded devices
(internetcensus2012.bitbucket.org)
The official press release is sort of lacking in details. You can find more on the research group's website.
* http://www.stanford.edu/group/brainsinsilicon/neurogrid.html
* http://www.stanford.edu/group/brainsinsilicon/goals.html
The gist of how it works is that analog circuits model the ion...
> [..] In this talk, we present several methods that make *the large scale
security analyses of embedded devices* a feasible task. We implemented
those techniques in a scalable framework that we tested on real world data.
First, we collected a large number of firmware images from Internet
reposi...