Research and Development of an Embedded Security Network Card Based on AM 1808

Article Preview

Abstract:

In this paper, a design scheme is proposed of security network card based on AM 1808 for an embedded system. In the card, embedded firewall, network security device, hard-disk protection and restoration, encryption machine and other network security products are integrated. According to practical needs, the function of embedded security network card is extended and reduced.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

235-240

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Goswami, T. Bezboruah and K.C. Sarma, Design of an Embedded System For Monitoring and Controlling Temperature and Light, International journal of electronic engineering research, 2009, 1(1): 27–36.

Google Scholar

[2] Krzyszt, Design of Embedded System, Department of Computer Science Lund Institute of Technology Sweden (2013).

Google Scholar

[3] Z. Basnight, J. Butts, J. Lopez Jr, and T. Dube, Firmware modi_cation attacks on programmable logic controllers, International Journal of Critical Infrastructure Protection (2013).

DOI: 10.1016/j.ijcip.2013.04.004

Google Scholar

[4] V. Chipounov and G. Candea, Reverse engineering of binary device drivers with revnic, In Proceedings of the 5th European conference on Computer systems, 2010: 167-180.

DOI: 10.1145/1755913.1755932

Google Scholar

[5] A. Cui, M. Costello, and S. J. Stolfo, When _rmware modi_cations attack: A case study of embedded exploitation, In Proceedings of the Symposium on Network and Distributed System Security (NDSS) (2013).

Google Scholar

[6] L. R. McMinn, External veri_cation of scada system embedded controller _rmware, Technical report, DTIC Document (2012).

Google Scholar

[7] A. Cui and S. J. Stolfo, A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010: 97-106.

DOI: 10.1145/1920261.1920276

Google Scholar