Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

deeply embedded systems

biblio

Visible to the public Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Submitted by aekwall on Mon, 06/15/2020 - 10:56am
  • Hardware
  • μArmor approach
  • vulnerability exposure windows
  • statistical analysis
  • security of data
  • security
  • Resiliency
  • real-time systems
  • pubcrawl
  • operating systems (computers)
  • Metrics
  • Linux
  • Linux Operating System Security
  • Exploiting
  • exploit mitigation
  • embedded systems
  • Embedded System
  • embedded patch management
  • embedded operating systems
  • embedded memory corruption vulnerabilities
  • deeply embedded systems
  • composability
  • common hardening techniques
  • Predictive Metrics

Terms of Use  |  ©2023. CPS-VO