SAFE-OPS: An Approach to Embedded Software Security

Joseph Zambreno, Alok Choudhary, Rahul Simha, Bhagi Narahari, Nasir Memon

Research output: Contribution to journalArticle

Abstract

The new-found ubiquity of embedded processors in consumer and industrial applications brings with it an intensified focus on security, as a strong level of trust in the system software is crucial to their widespread deployment. The growing area of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper, we introduce a unique approach to embedded software protection that utilizes a hardware/software codesign methodology. Results demonstrate that this framework can be the successful basis for the development of embedded applications that meet a wide range of security and performance requirements.

Original languageEnglish (US)
Pages (from-to)189-210
Number of pages22
JournalACM Transactions on Embedded Computing Systems
Volume4
Issue number1
DOIs
StatePublished - Feb 1 2005

Fingerprint

Embedded software
Industrial applications
Hardware-software codesign

Keywords

  • Design
  • HW/SW codesign
  • Measurement
  • Performance
  • Security
  • Software protection

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture

Cite this

SAFE-OPS : An Approach to Embedded Software Security. / Zambreno, Joseph; Choudhary, Alok; Simha, Rahul; Narahari, Bhagi; Memon, Nasir.

In: ACM Transactions on Embedded Computing Systems, Vol. 4, No. 1, 01.02.2005, p. 189-210.

Research output: Contribution to journalArticle

Zambreno, Joseph ; Choudhary, Alok ; Simha, Rahul ; Narahari, Bhagi ; Memon, Nasir. / SAFE-OPS : An Approach to Embedded Software Security. In: ACM Transactions on Embedded Computing Systems. 2005 ; Vol. 4, No. 1. pp. 189-210.
@article{425a9716808f49aebb0b11158019524f,
title = "SAFE-OPS: An Approach to Embedded Software Security",
abstract = "The new-found ubiquity of embedded processors in consumer and industrial applications brings with it an intensified focus on security, as a strong level of trust in the system software is crucial to their widespread deployment. The growing area of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper, we introduce a unique approach to embedded software protection that utilizes a hardware/software codesign methodology. Results demonstrate that this framework can be the successful basis for the development of embedded applications that meet a wide range of security and performance requirements.",
keywords = "Design, HW/SW codesign, Measurement, Performance, Security, Software protection",
author = "Joseph Zambreno and Alok Choudhary and Rahul Simha and Bhagi Narahari and Nasir Memon",
year = "2005",
month = "2",
day = "1",
doi = "10.1145/1053271.1053279",
language = "English (US)",
volume = "4",
pages = "189--210",
journal = "Transactions on Embedded Computing Systems",
issn = "1539-9087",
publisher = "Association for Computing Machinery (ACM)",
number = "1",

}

TY - JOUR

T1 - SAFE-OPS

T2 - An Approach to Embedded Software Security

AU - Zambreno, Joseph

AU - Choudhary, Alok

AU - Simha, Rahul

AU - Narahari, Bhagi

AU - Memon, Nasir

PY - 2005/2/1

Y1 - 2005/2/1

N2 - The new-found ubiquity of embedded processors in consumer and industrial applications brings with it an intensified focus on security, as a strong level of trust in the system software is crucial to their widespread deployment. The growing area of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper, we introduce a unique approach to embedded software protection that utilizes a hardware/software codesign methodology. Results demonstrate that this framework can be the successful basis for the development of embedded applications that meet a wide range of security and performance requirements.

AB - The new-found ubiquity of embedded processors in consumer and industrial applications brings with it an intensified focus on security, as a strong level of trust in the system software is crucial to their widespread deployment. The growing area of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper, we introduce a unique approach to embedded software protection that utilizes a hardware/software codesign methodology. Results demonstrate that this framework can be the successful basis for the development of embedded applications that meet a wide range of security and performance requirements.

KW - Design

KW - HW/SW codesign

KW - Measurement

KW - Performance

KW - Security

KW - Software protection

UR - http://www.scopus.com/inward/record.url?scp=85015850662&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85015850662&partnerID=8YFLogxK

U2 - 10.1145/1053271.1053279

DO - 10.1145/1053271.1053279

M3 - Article

AN - SCOPUS:85015850662

VL - 4

SP - 189

EP - 210

JO - Transactions on Embedded Computing Systems

JF - Transactions on Embedded Computing Systems

SN - 1539-9087

IS - 1

ER -