skip to main content
10.1145/2402676.2402695acmconferencesArticle/Chapter ViewAbstractPublication PagesadaConference Proceedingsconference-collections
keynote

HACMS: high assurance cyber military systems

Published: 02 December 2012 Publication History

Abstract

Embedded systems form a ubiquitous, networked, computing substrate that underlies much of modern technological society. Such systems range from large supervisory control and data acquisition (SCADA) systems that manage physical infrastructure to medical devices such as pace-makers and insulin pumps, to computer peripherals such as printers and routers, to communication devices such as cell phones and radios, to vehicles such as airplanes and satellites. Such devices have been networked for a variety of reasons, including the ability to conveniently access diagnostic information, perform software updates, provide innovative features, lower costs, and improve ease of use. Researchers and hackers have shown that these kinds of networked embedded systems are vulnerable to remote attack, and such attacks can cause physical damage while hiding the effects from monitors.

Cited By

View all
  • (2022)START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report)2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)10.1109/ISSRE55969.2022.00018(73-84)Online publication date: Oct-2022
  • (2017)LMS-Verify: abstraction without regret for verified systems programmingACM SIGPLAN Notices10.1145/3093333.300986752:1(859-873)Online publication date: 1-Jan-2017
  • (2017)LMS-Verify: abstraction without regret for verified systems programmingProceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages10.1145/3009837.3009867(859-873)Online publication date: 1-Jan-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HILT '12: Proceedings of the 2012 ACM conference on High integrity language technology
December 2012
118 pages
ISBN:9781450315050
DOI:10.1145/2402676

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 December 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. embedded systems
  2. high-assurance software

Qualifiers

  • Keynote

Conference

HILT'12
Sponsor:
HILT'12: ACM SIGAda Annual
December 2 - 6, 2012
Massachusetts, Boston, USA

Acceptance Rates

HILT '12 Paper Acceptance Rate 6 of 11 submissions, 55%;
Overall Acceptance Rate 27 of 48 submissions, 56%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report)2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)10.1109/ISSRE55969.2022.00018(73-84)Online publication date: Oct-2022
  • (2017)LMS-Verify: abstraction without regret for verified systems programmingACM SIGPLAN Notices10.1145/3093333.300986752:1(859-873)Online publication date: 1-Jan-2017
  • (2017)LMS-Verify: abstraction without regret for verified systems programmingProceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages10.1145/3009837.3009867(859-873)Online publication date: 1-Jan-2017
  • (2017)Advances in Connection-Based Automated Theorem ProvingProvably Correct Systems10.1007/978-3-319-48628-4_9(211-241)Online publication date: 2-Mar-2017
  • (2015)Empirical study towards a leading indicator for cost of formal software verificationProceedings of the 37th International Conference on Software Engineering - Volume 110.5555/2818754.2818842(722-732)Online publication date: 16-May-2015
  • (2015)Research Priorities for Robust and Beneficial Artificial IntelligenceAI Magazine10.1609/aimag.v36i4.257736:4(105-114)Online publication date: Dec-2015
  • (2015)Securing the Internet of Things a military perspectiveProceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT.2015.7389105(502-507)Online publication date: 14-Dec-2015
  • (2015)Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification2015 IEEE/ACM 37th IEEE International Conference on Software Engineering10.1109/ICSE.2015.85(722-732)Online publication date: May-2015
  • (2024)Challenges in Dynamic Analysis of Drone Firmware and Its SolutionsIEEE Access10.1109/ACCESS.2024.342560412(106593-106604)Online publication date: 2024
  • (2023)A Review on C3I Systems’ Security: Vulnerabilities, Attacks, and CountermeasuresACM Computing Surveys10.1145/355800155:9(1-38)Online publication date: 16-Jan-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media