Skip to main content
Log in

Design and verification of protected systems with integrated devices based on expert knowledge

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The approach to identifying expert knowledge in the field of the information security of integrated devices for their further use by the developers of integrated devices, including as the input data of integrated devices in the design and verification of integrated devices is offered.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ruiz, J.F., Desnitsky, V., Harjani, R., Manna, A., Kotenko, I., and Cchechulin, A., A methodology for the analysis and modeling of security threats and attacks for systems of embedded components, Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2012), Garching/ Munich, 2012, pp. 261–268.

    Google Scholar 

  2. Object Management Group “The UML Profile for MARTE: Modeling and Analysis of Real-Time and Embedded Systems,” Version 1.1, 2011.

  3. SecFutur, Design of Secure and energy-efficient embedded systems for Future internet applications, FP7 Project. http://www.secfutur.eu

  4. Burleson, W., Clark, S.S., Ransford, B., and Fu, K., Design challenges for secure implantable medical devices, Design Automation Conference (DAC), 49th ACM/EDAC/IEEE, 2012, pp. 12–17.

    Google Scholar 

  5. Kotenko, I. and Polubelova, O., Verification of security policy filtering rules by model checking, Proceedings of IEEE Fourth International Workshop on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2011), 2011, pp. 706–710.

    Chapter  Google Scholar 

  6. Chechulin, A., Kotenko, I., and Desnitsky, V., An approach for network information flow analysis for systems of embedded components, LNCS, Springer-Verlag, 2012, vol. 7531, pp. 146–155.

    Google Scholar 

  7. Desnitsky, V., Kotenko, I., and Chechulin, A., Configuration-based approach to embedded device security, LNCS, 2012, vol. 7531, pp. 270–285.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to I. V. Kotenko.

Additional information

Original Russian Text © V.A. Desnitskii, I.V. Kotenko, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Desnitskii, V.A., Kotenko, I.V. Design and verification of protected systems with integrated devices based on expert knowledge. Aut. Control Comp. Sci. 49, 648–652 (2015). https://doi.org/10.3103/S0146411615080246

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080246

Keywords

Navigation