Essays about: "security embedded systems"

Showing result 1 - 5 of 76 essays containing the words security embedded systems.

  1. 1. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Klasson Landin; Truls Julborg; [2023]
    Keywords : Side channel attack; Cryptography; Correlation power analysis; Chipwhisperer; Frequency; Hardware security;

    Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE

  2. 2. Ecosystems Services in swidden agriculture in the Peruvian tropical Andes : the Kechwa-Lamas farm-forestry system

    University essay from SLU/Dept. of Urban and Rural Development

    Author : Geannine Gisset Chabaneix Portocarrero; [2023]
    Keywords : swidden agriculture; ecosystem services; Peru; Amazon;

    Abstract : In the Amazon, life supporting services are importantly associated to forest areas. Nevertheless, the connection of ecosystem services to agricultural systems it is also of great importance, because agriculture is one of the most important causes of degradation and loss of these areas. READ MORE

  3. 3. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE

  4. 4. A Decision Support System for Evaluating Kernel And Operating System Security in Embedded Systems

    University essay from Blekinge Tekniska Högskola

    Author : Jonathan Olsson; [2023]
    Keywords : ;

    Abstract : .... READ MORE

  5. 5. Does Rust SPARK joy? : Recommendations for safe cross-language bindings between Rust and SPARK

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Aïssata Maiga; [2023]
    Keywords : Rust; Ada; SPARK; Foreign Function Interface FFI ; memory safety; type safety; ownership; Rust; Ada; SPARK; Gränssnitt för främmande funktioner FFI ; minnessäkerhet; typsäkerhet; ägarskap;

    Abstract : This thesis aims to provide recommendations for interfacing two memory-safe programming languages, Rust and SPARK. The comparison of Rust and C/C++, as well as SPARK and C/C++, has been thoroughly researched. However, this level of investigation hasn’t been as extensive between memory-safe languages. READ MORE