Worst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems

Download Now
Provided by: North Carolina State University
Topic: Security
Format: PDF
Deeply embedded systems often have unique constraints because of their small size and vital roles in critical infrastructure. Problems include limitations on code size, limited access to the actual hardware, etc. These problems become more critical in real-time systems where security policies must not only work within the above limitations but also ensure that task deadlines are not missed. A critical piece of information for security policies in real-time systems is the Worst-Case Execution Time (WCET) of the security code.
Download Now

Find By Topic