Šimůnek, 2018 - Google Patents
Bezpečný upgrade firmware embedded platformyŠimůnek, 2018
View HTML- Document ID
- 15327700224901417260
- Author
- Šimůnek J
- Publication year
External Links
Snippet
This bachelor thesis deals with the design of process procedure for embedded platform firmware management (secure upgrade). The theoretical part consists of characteristics of vulnerabilities in embedded systems and design of commonly used secure upgrade …
- 238000000034 method 0 abstract description 99
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/319—Tester hardware, i.e. output processing circuit
- G01R31/31903—Tester hardware, i.e. output processing circuit tester configuration
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/2832—Specific tests of electronic circuits not provided for elsewhere
- G01R31/2836—Fault-finding or characterising
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/282—Testing of electronic circuits specially adapted for particular applications not provided for elsewhere
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Strand | Adaptive distributed firewall using intrusion detection | |
US20200328885A1 (en) | Enhanced monitoring and protection of enterprise data | |
JP6545136B2 (en) | System and method for encrypted transmission of web pages | |
Batalla et al. | RETRACTED ARTICLE: Deployment of smart home management system at the edge: mechanisms and protocols | |
US20160182486A1 (en) | Space-time separated and jointly evolving relationship-based network access and data protection system | |
US11838283B2 (en) | Network enclave attestation for network and compute devices | |
Liu et al. | Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices | |
US11588852B2 (en) | Vulnerability validation using attack payloads | |
Liu et al. | Uncovering security vulnerabilities in the Belkin WeMo home automation ecosystem | |
Lakshminarayana et al. | Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects | |
Samarasinghe et al. | Another look at TLS ecosystems in networked devices vs. web servers | |
US20190268317A1 (en) | Cyber Security System | |
Makrakis et al. | Vulnerabilities and attacks against industrial control systems and critical infrastructures | |
Thakur et al. | Ransomware: Threats, identification and prevention | |
Kloibhofer et al. | LoRaWAN with HSM as a security improvement for agriculture applications | |
Atighetchi et al. | Safe configuration of TLS connections | |
Gordeychik et al. | SD-WAN Threat Landscape | |
Šimůnek | Bezpečný upgrade firmware embedded platformy | |
Oberhofer et al. | Market Research on IIoT Standard Compliance Monitoring Providers and deriving Attributes for IIoT Compliance Monitoring | |
Good | Security analysis of a siemens SICAM CMIC remote terminal unit | |
Ngongang | Cloud Computing Security | |
Burmester | A trusted computing architecture for critical infrastructure protection | |
Ngo | Cloud Security: Private Cloud Solution with End-to-end Encryption | |
ULANC et al. | Deliverable D4. 2 | |
Szreder | IoT Security in Practice: A Computer Security Analysis of the IKEA “TRÅDFRI” Platform |