Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Author(s): Christoph Grimm, Markus Damm, Jan Haase (auth.), Alexander Biedermann, H. Gregor Molter (eds.)
Series: Lecture Notes in Electrical Engineering 78
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011

Language: English
Pages: 207
Tags: Circuits and Systems; Control, Robotics, Mechatronics; Electrical Engineering; Special Purpose and Application-Based Systems

Front Matter....Pages -
Towards Co-design of HW/SW/Analog Systems....Pages 1-24
A Flexible Hierarchical Approach for Controlling the System-Level Design Complexity of Embedded Systems....Pages 25-42
Side-Channel Analysis – Mathematics Has Met Engineering....Pages 43-62
Survey of Methods to Improve Side-Channel Resistance on Partial Reconfigurable Platforms....Pages 63-84
Multicast Rekeying: Performance Evaluation....Pages 85-104
Robustness Analysis of Watermark Verification Techniques for FPGA Netlist Cores....Pages 105-127
Efficient and Flexible Co-processor for Server-Based Public Key Cryptography Applications....Pages 129-149
Cellular-Array Implementations of Bio-inspired Self-healing Systems: State of the Art and Future Perspectives....Pages 151-170
Combined Man-in-the-Loop and Software-in-the-Loop Simulation....Pages 171-185
Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication....Pages 187-206
Back Matter....Pages -