Abstract
The approach to identifying expert knowledge in the field of the information security of integrated devices for their further use by the developers of integrated devices, including as the input data of integrated devices in the design and verification of integrated devices is offered.
Similar content being viewed by others
References
Ruiz, J.F., Desnitsky, V., Harjani, R., Manna, A., Kotenko, I., and Cchechulin, A., A methodology for the analysis and modeling of security threats and attacks for systems of embedded components, Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2012), Garching/ Munich, 2012, pp. 261–268.
Object Management Group “The UML Profile for MARTE: Modeling and Analysis of Real-Time and Embedded Systems,” Version 1.1, 2011.
SecFutur, Design of Secure and energy-efficient embedded systems for Future internet applications, FP7 Project. http://www.secfutur.eu
Burleson, W., Clark, S.S., Ransford, B., and Fu, K., Design challenges for secure implantable medical devices, Design Automation Conference (DAC), 49th ACM/EDAC/IEEE, 2012, pp. 12–17.
Kotenko, I. and Polubelova, O., Verification of security policy filtering rules by model checking, Proceedings of IEEE Fourth International Workshop on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2011), 2011, pp. 706–710.
Chechulin, A., Kotenko, I., and Desnitsky, V., An approach for network information flow analysis for systems of embedded components, LNCS, Springer-Verlag, 2012, vol. 7531, pp. 146–155.
Desnitsky, V., Kotenko, I., and Chechulin, A., Configuration-based approach to embedded device security, LNCS, 2012, vol. 7531, pp. 270–285.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © V.A. Desnitskii, I.V. Kotenko, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Desnitskii, V.A., Kotenko, I.V. Design and verification of protected systems with integrated devices based on expert knowledge. Aut. Control Comp. Sci. 49, 648–652 (2015). https://doi.org/10.3103/S0146411615080246
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080246