Model-based configuration of access protection units for multicore processors in embedded systems
T Dörr, T Sandmann, J Becker - Microprocessors and Microsystems, 2021 - Elsevier
Multiprocessor system-on-chip platforms are becoming increasingly common in embedded
systems. To facilitate a logical isolation of physically connected on-chip components …
systems. To facilitate a logical isolation of physically connected on-chip components …
A formal model for the automatic configuration of access protection units in mpsoc-based embedded systems
T Dörr, T Sandmann, J Becker - 2020 23rd Euromicro …, 2020 - ieeexplore.ieee.org
Heterogeneous system-on-chip platforms with multiple processing cores are becoming
increasingly common in safety-and security-critical embedded systems. To facilitate a logical …
increasingly common in safety-and security-critical embedded systems. To facilitate a logical …
A Fuzz Testing Approach for Embedded Avionic Software
L Xompero, T Mohammad, J Isoaho, J Grossi - Procedia Computer Science, 2024 - Elsevier
The objective of the research was to find if it was possible to apply fuzz testing, a technique
that can be used to test software to discover vulnerabilities, on an embedded avionic …
that can be used to test software to discover vulnerabilities, on an embedded avionic …
Key management in wireless sensor networks
L Lopriore - Information Security Journal: A Global Perspective, 2019 - Taylor & Francis
We refer to a distributed architecture consisting of sensor nodes connected by wireless links
and organized in a tree-shaped hierarchy. We present a paradigm for the management of …
and organized in a tree-shaped hierarchy. We present a paradigm for the management of …
Extended pointers for memory protection in single address space systems
L Lopriore, A Santone - Computers & Electrical Engineering, 2020 - Elsevier
With reference to a single address space paradigm of memory addressing, we identify a set
of mechanisms aimed at preserving the integrity of the virtual space of a given process from …
of mechanisms aimed at preserving the integrity of the virtual space of a given process from …
Information Provenance for Mobile Health Data
TA Hardin - 2022 - search.proquest.com
Mobile health (mHealth) apps and devices are increasingly popular for health research,
clinical treatment and personal wellness, as they offer the ability to continuously monitor …
clinical treatment and personal wellness, as they offer the ability to continuously monitor …
Bootstrapping protocols analysis for IoT
JN Schimmelpfennig - 2022 - digibuo.uniovi.es
Analisis de protocolos de bootstrapping para IoT Page 1 ESCUELA POLITÉCNICA DE
INGENIERÍA DE GIJON GRADO EN INGENIERÍA EN TECNOLOGÍAS Y SERVICIOS DE …
INGENIERÍA DE GIJON GRADO EN INGENIERÍA EN TECNOLOGÍAS Y SERVICIOS DE …
[PDF][PDF] Implementation of Efficient Load aware Memory Management (ELMM) Algorithm
KS Sundari, R Narmadha - kalaharijournals.com
Embedded system is considered as a variety of computer system has developed for certain
dedicated application usually along real-time computing restraints. The recent and complex …
dedicated application usually along real-time computing restraints. The recent and complex …
Strict Memory Protection for Microcontrollers
E Sveen - 2019 - ntnuopen.ntnu.no
Moderne datasystemer beskytter prosesser fra hverandre med minnebeskyttelse.
Mikrokontrollersystemer, som mangler støtte for minnevirtualisering, bruker typisk sett kun …
Mikrokontrollersystemer, som mangler støtte for minnevirtualisering, bruker typisk sett kun …