Abstract
Embedded systems, such as those found in mobile phones or satellites, have grown in popularity in the recent years. Code that executes in these environments needs to be verified as safe, so they do not expose sensitive data or hidden APIs to the outside world. With enough knowledge of the code and the environment in which it executes, malicious entities can find and exploit vulnerabilities for their own gain. Failure to protect and verify executing software can leak or corrupt sensitive data, and in extreme cases cause loss of the device. This chapter explores security through language, compiler, and software techniques. The techniques and discussion apply to general system security. However, they are equally applicable to the systems described above.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Handbook on Securing Cyber-Physical Critical Infrastructure
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.