Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

IEEE.

org IEEE Xplore IEEE SA IEEE Spectrum More Sites SUBSCRIBE SUBSCRIBE Cart  Create Pers
 Account Sign

 Browse  My Settings  Help  Institutional Sign In

Institutional Sign In

All  

ADVANCED SEARCH

 < Previous   |   Back to Results   |   Next > 


Conferences > 2015 International Conference... 

Framework for software tampering detection in embedded More


Like
This
systems The Effect of Hardware Platform Selection on
Safety-Critical Software in Embedded
Publisher: IEEE Cite This  PDF
Systems: Empirical Evaluations
2007 International Symposium on Industrial
Embedded Systems
 << Results   |  < Previous   |   Next > 
Published: 2007
Abdo Ali Abdullah Al-Wosabi ; Zarina Shukur ; Muhammad Azwan Ibrahim All Authors
Using SysML for Modeling of Safety-Critical
  Software-Hardware Interfaces: Guidelines
and Industry Experience
2
Paper
184
Full Alerts 2011 IEEE 13th International Symposium on
Citations Text Views High-Assurance Systems Engineering
Manage Content Alerts Published: 2011

Add to Citation Alerts


Show
More

Abstract

Downl
Document PDF
Sections

I. Introduction
Abstract:Embedded systems (ES) become available anywhere and anytime as
an established part of our daily routine. Developers of these systems face
II. Related significant challenges in code a... View more
Definitions and
Concepts  Metadata
Abstract:
III. Related Work
Embedded systems (ES) become available anywhere and anytime as an
IV. Real World established part of our daily routine. Developers of these systems face
Examples significant challenges in code and information security. Whereas, software
tampering is one of these challenges, code integrity detection is one of the
V. The Conceptual
main approaches used to defeat it. Checking code integrity achieves tamper
Framework
proofing by method of identification of unauthorized alteration to recognize any
Show Full Outline 
tampered code is executed or tampered data are used. Our research objective
is to propose an applicable framework for tampering detection in ES and this
Authors
paper introduces the exploratory outcomes so far.

Figures
Published in: 2015 International Conference on Electrical Engineering and
References Informatics (ICEEI)

Citations Date of Conference: 10-11 August 2015 INSPEC Accession Number: 15663942

Keywords Date Added to IEEE Xplore: 17 DOI: 10.1109/ICEEI.2015.7352507


December 2015
Publisher: IEEE
Metrics
 ISBN Information:
Conference Location: Denpasar,
Loading [MathJax]/extensions/MathMenu.js Indonesia
More Like This
More Like This
Electronic ISSN: 2155-6830

Contents

I. Introduction
Embedded systems (ES) are expected to execute substantial
functions in the future, and today they have already extended to
many digital appliances from low-end to high-end devices.
However, the evolution in their usefulness has resulted in more
prominent interfaces that may be misused to threaten them.
Embedded system tampering (EST) is such a latent threat which
can be implemented by using certain tools for injecting the
tampered/malicious codes. Mostly, an attacker's aim is to
acquire control over some
Sign in features
to Continue
of theReading
software with an illegal
alteration on the executable code and behavior. A real world
example is the detected malpractices in fuel retail outlets in
Malaysia. A petrol station in Silibin, Ipoh was sealed after law
enforcers found that the administrator had manipulated with all
its 26 fuel pumps to make more profits illegally. The metrology
expert found that the petrol gauge at the pumps had been
adjusted with dubious readings. Also, a number of cases have
been reported in India [l ],[2]

Authors 

Figures

References 
Citations 
Keywords 
Metrics 

IEEE Personal Account Purchase Details Profile Information Need Help? Follow

CHANGE PAYMENT OPTIONS COMMUNICATIONS US & CANADA: +1 800 678   


USERNAME/PASSWORD PREFERENCES 4333
VIEW PURCHASED
DOCUMENTS PROFESSION AND EDUCATION WORLDWIDE: +1 732 981
0060
TECHNICAL INTERESTS
CONTACT & SUPPORT

About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | IEEE Ethics Reporting  | Sitemap |
Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of
humanity.

© Copyright 2022 IEEE - All rights reserved.

IEEE Account Purchase Details Profile Information Need Help?

» Change Username/Password » Payment Options » Communications Preferences » US & Canada: +1 800 678 4333
» Update Address » Order History » Profession and Education » Worldwide: +1 732 981 0060

» View Purchased Documents » Technical Interests » Contact & Support

About IEEE
Loading Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | Sitemap | Privacy & Opting Out of Cookies
[MathJax]/extensions/MathMenu.js
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2022 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Loading [MathJax]/extensions/MathMenu.js

You might also like