Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and AssertionsReport as inadecuate




Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions - Download this document for free, or read online. Document in PDF available to download.

1 Institute for Technical Informatics 2 NXP Semiconductors Austria GmbH

Abstract : Most modern embedded systems include an operating system. Not all functions in the operating systems have to fulfill the same security requirements. In this work we propose a mechanism to identify and maintain functions that have to meet strict security needs. This mechanism is based on annotations representing security constrains and assertions to check these security annotations during the verification phase of the system under development.





Author: Johannes Loinig - Christian Steger - Reinhold Weiss - Ernst Haselsteiner -

Source: https://hal.archives-ouvertes.fr/



DOWNLOAD PDF




Related documents