Search engine :
Return to the menu
Vote:
Results:
1 Votes
SEPTEMBER 2016 - Volume: 91 - Pages: 484
Download pdf
ABSTRACT: Nowdays almost all electronic devices we use have integrated some embedded system designed for a specific purpose, which facilitate our quality of life enormously and we can added the posibility to connect via the Internet to access remotely the information. This means that our devices are more vulnerable to possible attacks and we must protect ourselves as much as possible.In this paper we see the historical development of embedded systms, their use and their current situtation. We show a practical case of scanning and detection of potential vulnerabilities of a real-time operating system that can be installed in embedded systems and a variety of rules to follow to protect them both physically and in terms of software.Keywords: Embedded system (SE), real-time operating system (RTOS), vulnerability scanning tools
Share:
© Engineering Journal Dyna 2006 - Publicaciones Dyna, S.L
Official Science and Technology Body of the Federation of Industrial Engineers' Associations
Address: Unit 1804 South Bank Tower, 55 Upper Ground, London UK, SE1 9EY
Email: office@revistadyna.com
Regístrese en un paso con su email y podrá personalizar sus preferencias mediante su perfil
Name: *
Surname 1: *
Surname 2:
Email: *