skip to main content
keynote

HACMS: high assurance cyber military systems

Published:02 December 2012Publication History
Skip Abstract Section

Abstract

Embedded systems form a ubiquitous, networked, computing substrate that underlies much of modern technological society. Such systems range from large supervisory control and data acquisition (SCADA) systems that manage physical infrastructure to medical devices such as pace-makers and insulin pumps, to computer peripherals such as printers and routers, to communication devices such as cell phones and radios, to vehicles such as airplanes and satellites. Such devices have been networked for a variety of reasons, including the ability to conveniently access diagnostic information, perform software updates, provide innovative features, lower costs, and improve ease of use. Researchers and hackers have shown that these kinds of networked embedded systems are vulnerable to remote attack, and such attacks can cause physical damage while hiding the effects from monitors.

Index Terms

  1. HACMS: high assurance cyber military systems

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in

                      Full Access

                      • Published in

                        cover image ACM SIGAda Ada Letters
                        ACM SIGAda Ada Letters  Volume 32, Issue 3
                        HILT '12
                        December 2012
                        89 pages
                        ISSN:1094-3641
                        DOI:10.1145/2402709
                        Issue’s Table of Contents
                        • cover image ACM Conferences
                          HILT '12: Proceedings of the 2012 ACM conference on High integrity language technology
                          December 2012
                          118 pages
                          ISBN:9781450315050
                          DOI:10.1145/2402676

                        Copyright © 2012 Author

                        Publisher

                        Association for Computing Machinery

                        New York, NY, United States

                        Publication History

                        • Published: 2 December 2012

                        Check for updates

                        Qualifiers

                        • keynote

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader
                      About Cookies On This Site

                      We use cookies to ensure that we give you the best experience on our website.

                      Learn more

                      Got it!