SECURITY METHOD OF EMBEDDED SOFTWARE FOR MECHATRONIC SYSTEMS

作者: A. Venčkauskas , N. Jusas , L. Kižauskienė , E. Kazanavičius , V. Kazanavičius

DOI: 10.5755/J01.MECH.18.2.1572

关键词:

摘要: This paper proposes embedded software of mechatronic system protection method based on encryption and decryption code critical program modules during runtime. Secret keys are not stored, but generated by the signature components. experimentally researches application symmetric cryptographic algorithms influence security mechanisms characteristics (value entropy secret key, operating speed, amount memory) software. DOI: http://dx.doi.org/10.5755/j01.mech.18.2.1572

参考文章(23)
Christian Collberg, Douglas Low, C. Thomborson, A Taxonomy of Obfuscating Transformations Department of Computer Science, The University of Auckland, New Zealand. ,(1997)
Sachin Babar, Antonietta Stango, Neeli Prasad, Jaydip Sen, Ramjee Prasad, Proposed embedded security framework for Internet of Things (IoT) international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology. pp. 1- 5 ,(2011) , 10.1109/WIRELESSVITAE.2011.5940923
Algimantas Venčkauskas, Nerijus Jusas, Irena Mikuckienė, Stasys Maciulevičius, Generation of the Secret Encryption Key Using the Signature of the Embedded System international test conference. ,vol. 41, pp. 368- 375 ,(2012) , 10.5755/J01.ITC.41.4.1162
M. Ubartas, V. Ostaševičius, S. Samper, V. Jūrėnas, R. Daukševičius, EXPERIMENTAL INVESTIGATION OF VIBRATIONAL DRILLING Mechanika. ,vol. 17, pp. 368- 373 ,(2011) , 10.5755/J01.MECH.17.4.563
Michael N. Gagnon, Stephen Taylor, Anup K. Ghosh, Software Protection through Anti-Debugging ieee symposium on security and privacy. ,vol. 5, pp. 82- 84 ,(2007) , 10.1109/MSP.2007.71
David Basin, Jürgen Doser, Torsten Lodderstedt, Model driven security ACM Transactions on Software Engineering and Methodology. ,vol. 15, pp. 39- 91 ,(2006) , 10.1145/1125808.1125810
Jan Jürjens, Using UMLsec and goal trees for secure systems development Proceedings of the 2002 ACM symposium on Applied computing - SAC '02. pp. 1026- 1030 ,(2002) , 10.1145/508791.508990
E. Kazanavicius, V. Kazanavicius, A. Venckauskas, R. Paskevicius, Securing Web Application by Embedded Firewall Elektronika Ir Elektrotechnika. ,vol. 119, pp. 65- 68 ,(2012) , 10.5755/J01.EEE.119.3.1366
Simon Barner, Michael Geisinger, Christian Buckl, Alois Knoll, EasyLab: Model-Based Development of Software for Mechatronic Systems european symposium on algorithms. pp. 540- 545 ,(2008) , 10.1109/MESA.2008.4735652
I.J. Jozwiak, A. Liber, K. Marczak, A Hardware-Based Software Protection Systems--Analysis of Security Dongles with Memory international multi conference on computing in global information technology. pp. 28- 28 ,(2007) , 10.1109/ICCGI.2007.2