Professional Documents
Culture Documents
Framework For Software Tampering Detection in Embedded Systems
Framework For Software Tampering Detection in Embedded Systems
org IEEE Xplore IEEE SA IEEE Spectrum More Sites SUBSCRIBE SUBSCRIBE Cart Create Pers
Account Sign
Institutional Sign In
All
ADVANCED SEARCH
Abstract
Downl
Document PDF
Sections
I. Introduction
Abstract:Embedded systems (ES) become available anywhere and anytime as
an established part of our daily routine. Developers of these systems face
II. Related significant challenges in code a... View more
Definitions and
Concepts Metadata
Abstract:
III. Related Work
Embedded systems (ES) become available anywhere and anytime as an
IV. Real World established part of our daily routine. Developers of these systems face
Examples significant challenges in code and information security. Whereas, software
tampering is one of these challenges, code integrity detection is one of the
V. The Conceptual
main approaches used to defeat it. Checking code integrity achieves tamper
Framework
proofing by method of identification of unauthorized alteration to recognize any
Show Full Outline
tampered code is executed or tampered data are used. Our research objective
is to propose an applicable framework for tampering detection in ES and this
Authors
paper introduces the exploratory outcomes so far.
Figures
Published in: 2015 International Conference on Electrical Engineering and
References Informatics (ICEEI)
Citations Date of Conference: 10-11 August 2015 INSPEC Accession Number: 15663942
Contents
I. Introduction
Embedded systems (ES) are expected to execute substantial
functions in the future, and today they have already extended to
many digital appliances from low-end to high-end devices.
However, the evolution in their usefulness has resulted in more
prominent interfaces that may be misused to threaten them.
Embedded system tampering (EST) is such a latent threat which
can be implemented by using certain tools for injecting the
tampered/malicious codes. Mostly, an attacker's aim is to
acquire control over some
Sign in features
to Continue
of theReading
software with an illegal
alteration on the executable code and behavior. A real world
example is the detected malpractices in fuel retail outlets in
Malaysia. A petrol station in Silibin, Ipoh was sealed after law
enforcers found that the administrator had manipulated with all
its 26 fuel pumps to make more profits illegally. The metrology
expert found that the petrol gauge at the pumps had been
adjusted with dubious readings. Also, a number of cases have
been reported in India [l ],[2]
Authors
Figures
References
Citations
Keywords
Metrics
IEEE Personal Account Purchase Details Profile Information Need Help? Follow
About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | IEEE Ethics Reporting | Sitemap |
Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of
humanity.
» Change Username/Password » Payment Options » Communications Preferences » US & Canada: +1 800 678 4333
» Update Address » Order History » Profession and Education » Worldwide: +1 732 981 0060
About IEEE
Loading Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | Sitemap | Privacy & Opting Out of Cookies
[MathJax]/extensions/MathMenu.js
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2022 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Loading [MathJax]/extensions/MathMenu.js