WESS'2010
Date: Oct 24, 2010 9:45 am – Oct 24, 2010 9:45 am
Location: Scottsdale, AZ
Embedded computing systems are continuously adopted in a wide range of application areas and importantly, they are responsible for a large number of safety-critical systems as well as for the management of critical information. The advent of Internet-enabled embedded systems introduces a large number of security issues: the Internet can be used to attack embedded systems and embedded systems can be used to attack the Internet. Furthermore, embedded systems are vulnerable to many attacks not relevant to servers because they are physically accessible. Inadvertent threats due to bugs, improper system use, etc. can also have effects that are indistinguishable from malicious attacks.
Submitted by Chris vanBuskirk
on
Date: Oct 24, 2010 9:45 am – Oct 24, 2010 9:45 am
Location: Scottsdale, AZ
Embedded computing systems are continuously adopted in a wide range of application areas and importantly, they are responsible for a large number of safety-critical systems as well as for the management of critical information. The advent of Internet-enabled embedded systems introduces a large number of security issues: the Internet can be used to attack embedded systems and embedded systems can be used to attack the Internet. Furthermore, embedded systems are vulnerable to many attacks not relevant to servers because they are physically accessible. Inadvertent threats due to bugs, improper system use, etc. can also have effects that are indistinguishable from malicious attacks.
Submitted by Chris vanBuskirk
on