{"title":"NAECON教程:可信系统和电子","authors":"C. Cerny, M. Casto","doi":"10.1109/NAECON.2017.8268711","DOIUrl":null,"url":null,"abstract":"As software and embedded systems take on more responsibilities in such fields as consumer products, medical devices, automobiles, airplanes, defense systems, financial systems, and manufacturing, the need to ensure that they behave as expected has become critical. Users must be able to trust that these systems are safe, reliable, secure, and appropriately responsive to the task at hand. Many strategies and tools have been developed to ensure safety and reliability, especially at the hardware level, and these continue to be modified and extended to work for embedded systems and complex software. But major challenges exist in the continually evolving area of security. We will review commonly accepted definitions of trust in various domains and look at some strategies for enhancing tools for developing trusted systems in general and secure systems in particular.","PeriodicalId":306091,"journal":{"name":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"NAECON tutorials: Trusted systems and electronics\",\"authors\":\"C. Cerny, M. Casto\",\"doi\":\"10.1109/NAECON.2017.8268711\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As software and embedded systems take on more responsibilities in such fields as consumer products, medical devices, automobiles, airplanes, defense systems, financial systems, and manufacturing, the need to ensure that they behave as expected has become critical. Users must be able to trust that these systems are safe, reliable, secure, and appropriately responsive to the task at hand. Many strategies and tools have been developed to ensure safety and reliability, especially at the hardware level, and these continue to be modified and extended to work for embedded systems and complex software. But major challenges exist in the continually evolving area of security. We will review commonly accepted definitions of trust in various domains and look at some strategies for enhancing tools for developing trusted systems in general and secure systems in particular.\",\"PeriodicalId\":306091,\"journal\":{\"name\":\"2017 IEEE National Aerospace and Electronics Conference (NAECON)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE National Aerospace and Electronics Conference (NAECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAECON.2017.8268711\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE National Aerospace and Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2017.8268711","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
As software and embedded systems take on more responsibilities in such fields as consumer products, medical devices, automobiles, airplanes, defense systems, financial systems, and manufacturing, the need to ensure that they behave as expected has become critical. Users must be able to trust that these systems are safe, reliable, secure, and appropriately responsive to the task at hand. Many strategies and tools have been developed to ensure safety and reliability, especially at the hardware level, and these continue to be modified and extended to work for embedded systems and complex software. But major challenges exist in the continually evolving area of security. We will review commonly accepted definitions of trust in various domains and look at some strategies for enhancing tools for developing trusted systems in general and secure systems in particular.