Abstract

Embedded systems, such as those found in mobile phones or satellites, have grown in popularity in the recent years. Code that executes in these environments needs to be verified as safe, so they do not expose sensitive data or hidden APIs to the outside world. With enough knowledge of the code and the environment in which it executes, malicious entities can find and exploit vulnerabilities for their own gain. Failure to protect and verify executing software can leak or corrupt sensitive data, and in extreme cases cause loss of the device. This chapter explores security through language, compiler, and software techniques. The techniques and discussion apply to general system security. However, they are equally applicable to the systems described above.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call