{"title":"嵌入式系统保护,防止软件损坏","authors":"F. Wolff, Chris Papachristou, D. Weyer, W. Clay","doi":"10.1109/AHS.2010.5546254","DOIUrl":null,"url":null,"abstract":"As Embedded Systems are being network enabled, allowing for remote updates and data sharing, software corruption has become a major concern. Security protection has mostly been overlooked. Software corruption can simplistically be considered as unauthorized instructions that are executed within the system. This can occur through behaviorally modified instruction code introduced via new software installation, updates, or application input data (such as buffer overflows). We introduce a vault architecture that prevents the insertion of software corruptions for embedded systems that allow remote access. Simulation results for the vault architecture are provided.","PeriodicalId":101655,"journal":{"name":"2010 NASA/ESA Conference on Adaptive Hardware and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Embedded system protection from software corruption\",\"authors\":\"F. Wolff, Chris Papachristou, D. Weyer, W. Clay\",\"doi\":\"10.1109/AHS.2010.5546254\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As Embedded Systems are being network enabled, allowing for remote updates and data sharing, software corruption has become a major concern. Security protection has mostly been overlooked. Software corruption can simplistically be considered as unauthorized instructions that are executed within the system. This can occur through behaviorally modified instruction code introduced via new software installation, updates, or application input data (such as buffer overflows). We introduce a vault architecture that prevents the insertion of software corruptions for embedded systems that allow remote access. Simulation results for the vault architecture are provided.\",\"PeriodicalId\":101655,\"journal\":{\"name\":\"2010 NASA/ESA Conference on Adaptive Hardware and Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 NASA/ESA Conference on Adaptive Hardware and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AHS.2010.5546254\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 NASA/ESA Conference on Adaptive Hardware and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AHS.2010.5546254","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Embedded system protection from software corruption
As Embedded Systems are being network enabled, allowing for remote updates and data sharing, software corruption has become a major concern. Security protection has mostly been overlooked. Software corruption can simplistically be considered as unauthorized instructions that are executed within the system. This can occur through behaviorally modified instruction code introduced via new software installation, updates, or application input data (such as buffer overflows). We introduce a vault architecture that prevents the insertion of software corruptions for embedded systems that allow remote access. Simulation results for the vault architecture are provided.