Software to system attacks
Embedded systems security
Article REF: H8280 V2
Software to system attacks
Embedded systems security

Author : Lilian BOSSUET

Publication date: October 10, 2024 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

2. Software to system attacks

Embedded systems have a software layer that exposes them to numerous threats. Like conventional computers, they are susceptible to malicious code that exploits software flaws, and to attacks that exploit more structural flaws at system level, as we will describe in the following sections.

2.1 Malicious code

Attacks involving computer infections, software or malicious code, are numerous and exploit many loopholes [H 5 440] . The aim of this article...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details