Research Article
Efficient Isolation of Trusted Subsystems in Embedded Systems
490 downloads
@INPROCEEDINGS{10.1007/978-3-642-16161-2_20, author={Raoul Strackx and Frank Piessens and Bart Preneel}, title={Efficient Isolation of Trusted Subsystems in Embedded Systems}, proceedings={Security and Privacy in Communication Networks. 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, proceedings_a={SECURECOMM}, year={2012}, month={5}, keywords={software security memory protection isolation}, doi={10.1007/978-3-642-16161-2_20} }
- Raoul Strackx
Frank Piessens
Bart Preneel
Year: 2012
Efficient Isolation of Trusted Subsystems in Embedded Systems
SECURECOMM
Springer
DOI: 10.1007/978-3-642-16161-2_20
Abstract
Many embedded systems have relatively strong security requirements because they handle confidential data or support secure electronic transactions. A prototypical example are payment terminals. To ensure that sensitive data such as cryptographic keys cannot leak, security-critical parts of these systems are implemented as separate chips, and hence physically isolated from other parts of the system.
Copyright © 2010–2024 ICST