As become more widely used, embedded systems security has increasingly gained attention. From the hardware point
of view, this paper describes the background of approach to the vulnerabilities and hardware Trojan detection of
embedded system, basic ideas and objectives; established the model- ESM (Embedded Systems Model) used to describe
embedded systems, provides the encoding method of the ESM system state. Based on this model, this article describes
how to use model checking methods to detect vulnerabilities and Trojan existence of an embedded system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.