2. Software to system attacks
Embedded systems have a software layer that exposes them to numerous threats. Like conventional computers, they are susceptible to malicious code that exploits software flaws, and to attacks that exploit more structural flaws at system level, as we will describe in the following sections.
2.1 Malicious code
Attacks involving computer infections, software or malicious code, are numerous and exploit many loopholes
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Software to system attacks
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!