Model-based configuration of access protection units for multicore processors in embedded systems

T Dörr, T Sandmann, J Becker - Microprocessors and Microsystems, 2021 - Elsevier
Multiprocessor system-on-chip platforms are becoming increasingly common in embedded
systems. To facilitate a logical isolation of physically connected on-chip components …

A formal model for the automatic configuration of access protection units in mpsoc-based embedded systems

T Dörr, T Sandmann, J Becker - 2020 23rd Euromicro …, 2020 - ieeexplore.ieee.org
Heterogeneous system-on-chip platforms with multiple processing cores are becoming
increasingly common in safety-and security-critical embedded systems. To facilitate a logical …

A Fuzz Testing Approach for Embedded Avionic Software

L Xompero, T Mohammad, J Isoaho, J Grossi - Procedia Computer Science, 2024 - Elsevier
The objective of the research was to find if it was possible to apply fuzz testing, a technique
that can be used to test software to discover vulnerabilities, on an embedded avionic …

Key management in wireless sensor networks

L Lopriore - Information Security Journal: A Global Perspective, 2019 - Taylor & Francis
We refer to a distributed architecture consisting of sensor nodes connected by wireless links
and organized in a tree-shaped hierarchy. We present a paradigm for the management of …

Extended pointers for memory protection in single address space systems

L Lopriore, A Santone - Computers & Electrical Engineering, 2020 - Elsevier
With reference to a single address space paradigm of memory addressing, we identify a set
of mechanisms aimed at preserving the integrity of the virtual space of a given process from …

Information Provenance for Mobile Health Data

TA Hardin - 2022 - search.proquest.com
Mobile health (mHealth) apps and devices are increasingly popular for health research,
clinical treatment and personal wellness, as they offer the ability to continuously monitor …

Bootstrapping protocols analysis for IoT

JN Schimmelpfennig - 2022 - digibuo.uniovi.es
Analisis de protocolos de bootstrapping para IoT Page 1 ESCUELA POLITÉCNICA DE
INGENIERÍA DE GIJON GRADO EN INGENIERÍA EN TECNOLOGÍAS Y SERVICIOS DE …

[PDF][PDF] Implementation of Efficient Load aware Memory Management (ELMM) Algorithm

KS Sundari, R Narmadha - kalaharijournals.com
Embedded system is considered as a variety of computer system has developed for certain
dedicated application usually along real-time computing restraints. The recent and complex …

Strict Memory Protection for Microcontrollers

E Sveen - 2019 - ntnuopen.ntnu.no
Moderne datasystemer beskytter prosesser fra hverandre med minnebeskyttelse.
Mikrokontrollersystemer, som mangler støtte for minnevirtualisering, bruker typisk sett kun …