[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Šimůnek, 2018 - Google Patents

Bezpečný upgrade firmware embedded platformy

Šimůnek, 2018

View HTML
Document ID
15327700224901417260
Author
Šimůnek J
Publication year

External Links

Snippet

This bachelor thesis deals with the design of process procedure for embedded platform firmware management (secure upgrade). The theoretical part consists of characteristics of vulnerabilities in embedded systems and design of commonly used secure upgrade …
Continue reading at dspace.cvut.cz (HTML) (other versions)

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/319Tester hardware, i.e. output processing circuit
    • G01R31/31903Tester hardware, i.e. output processing circuit tester configuration
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/2832Specific tests of electronic circuits not provided for elsewhere
    • G01R31/2836Fault-finding or characterising
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/282Testing of electronic circuits specially adapted for particular applications not provided for elsewhere

Similar Documents

Publication Publication Date Title
Strand Adaptive distributed firewall using intrusion detection
US20200328885A1 (en) Enhanced monitoring and protection of enterprise data
JP6545136B2 (en) System and method for encrypted transmission of web pages
Batalla et al. RETRACTED ARTICLE: Deployment of smart home management system at the edge: mechanisms and protocols
US20160182486A1 (en) Space-time separated and jointly evolving relationship-based network access and data protection system
US11838283B2 (en) Network enclave attestation for network and compute devices
Liu et al. Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices
US11588852B2 (en) Vulnerability validation using attack payloads
Liu et al. Uncovering security vulnerabilities in the Belkin WeMo home automation ecosystem
Lakshminarayana et al. Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects
Samarasinghe et al. Another look at TLS ecosystems in networked devices vs. web servers
US20190268317A1 (en) Cyber Security System
Makrakis et al. Vulnerabilities and attacks against industrial control systems and critical infrastructures
Thakur et al. Ransomware: Threats, identification and prevention
Kloibhofer et al. LoRaWAN with HSM as a security improvement for agriculture applications
Atighetchi et al. Safe configuration of TLS connections
Gordeychik et al. SD-WAN Threat Landscape
Šimůnek Bezpečný upgrade firmware embedded platformy
Oberhofer et al. Market Research on IIoT Standard Compliance Monitoring Providers and deriving Attributes for IIoT Compliance Monitoring
Good Security analysis of a siemens SICAM CMIC remote terminal unit
Ngongang Cloud Computing Security
Burmester A trusted computing architecture for critical infrastructure protection
Ngo Cloud Security: Private Cloud Solution with End-to-end Encryption
ULANC et al. Deliverable D4. 2
Szreder IoT Security in Practice: A Computer Security Analysis of the IKEA “TRÅDFRI” Platform