{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:43:52Z","timestamp":1743155032036,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813349216"},{"type":"electronic","value":"9789813349223"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":384,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>\nAt present, embedded devices have been widely used in people\u2019s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accidents that may cause casualties. In the field of embedded device security, there are many studies, for instance, OPENTEE for ARM handheld devices, providing a secure execution environment for payment devices, and SGX for Intel desk top devices, for security-critical applications, such as bank teller systems, build a safe operating environment. But it is a lack of correlation between these new and existing technologies. In our opinion, through the combination of mature technology accumulation and embedded devices, the antivirus industry can create a more secure user environment. In this paper, we propose a source isolation method to make the resources used by key processes exclusive. This method uses antivirus software and builds a more comprehensive embedded security system in critical security applications. The experimental results show that the proposed method is effective and safe.<\/jats:p>","DOI":"10.1007\/978-981-33-4922-3_17","type":"book-chapter","created":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:21:04Z","timestamp":1610968864000},"page":"222-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Embedded Security-Critical Device Resource Isolation"],"prefix":"10.1007","author":[{"given":"Xuguo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shengzhe","family":"Kan","sequence":"additional","affiliation":[]},{"given":"Yeli","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"17_CR1","unstructured":"Zhou, S.: On embedded network security technology. Network Security Technology and Application (in Chinese)"},{"key":"17_CR2","unstructured":"Wang, Z.: Research on network security technology based on embedded operating system. Network Security Technology and Application (in Chinese)"},{"key":"17_CR3","unstructured":"Du, G., Wang, L.: About the security analysis of embedded network firewall. Network Security Technology and Application (in Chinese)"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Lutz, R.: Analyzing software requirements errors in safety-critical. Embedded Syst., 126\u2013133 (1993). https:\/\/doi.org\/10.1109\/isre.1993.324825","DOI":"10.1109\/isre.1993.324825"},{"key":"17_CR5","unstructured":"Kane, A.: Runtime Monitoring for Safety-Critical Embedded Systems (2015)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Nejati, S., Alesio, S.D., Sabetzadeh, M., et al.: Modeling and analysis of CPU usage in safety-critical embedded systems to support stress testing. In: International Conference on Model Driven Engineering Languages and Systems. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-33666-9_48"},{"issue":"7","key":"17_CR7","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1145\/361011.361073","volume":"17","author":"GJ Popek","year":"1974","unstructured":"Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. Commun. ACM 17(7), 412\u2013421 (1974)","journal-title":"Commun. ACM"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Krammer, M., Martin, H., Karner, M., Watzenig, D., Fuchs, A.: System Modeling for Integration and Test of Safety-Critical Automotive Embedded Systems, 2 (2013). https:\/\/doi.org\/10.4271\/2013-01-0189","DOI":"10.4271\/2013-01-0189"},{"key":"17_CR9","unstructured":"Ding, Y.: Thinking of virus killing mechanism of embedded devices. Information Security and Communication Secrecy (in Chinese)"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Luo, J., Hubaux, J.-P.: Embedded Security in Cars. Embedded Security in Cars \u2013 Securing Current and Future Automotive IT Applications (2005). https:\/\/doi.org\/10.1007\/3-540-28428-1_7","DOI":"10.1007\/3-540-28428-1_7"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Babar, S., Stango, A., Prasad, N., et al.: Proposed embedded security framework for internet of things (IoT). In: IEEE International Conference on Wireless Communication. IEEE (2011)","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Othman, N.A., Aydin, I., Karakose, M.: An efficient embedded security system for reduce car accident to build safer world based on IoT. In: 2019 International Artificial Intelligence and Data Processing Symposium (IDAP) (2019)","DOI":"10.1109\/IDAP.2019.8875933"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Ali, S., Al Balushi, T., Nadir, Z.: Embedded Systems Security for Cyber-Physical Systems (2018)","DOI":"10.1007\/978-3-319-75880-0"},{"issue":"9","key":"17_CR14","first-page":"16","volume":"23","author":"T Kevan","year":"2018","unstructured":"Kevan, T.: Facing the embedded security crisis. Desktop Eng. 23(9), 16\u201319 (2018)","journal-title":"Desktop Eng."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Nathi, R.A., Sutar, D.S.: Embedded payload security scheme using CoAP for IoT device. In: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN) (2019)","DOI":"10.1109\/ViTECoN.2019.8899549"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"159","DOI":"10.14257\/ijsia.2015.9.2.15","volume":"9","author":"H Ye","year":"2015","unstructured":"Ye, H.: Security protection technology of cyber-physical systems. Int. J. Security Appl. 9, 159\u2013168 (2015)","journal-title":"Int. J. Security Appl."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"155","DOI":"10.14257\/ijsia.2015.9.1.17","volume":"9","author":"P Dong","year":"2015","unstructured":"Dong, P., Han, Y., Guo, X., Xie, F.: A systematic review of studies on cyber physical system security. Int. J. Security Appl. 9, 155\u2013164 (2015)","journal-title":"Int. J. Security Appl."}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4922-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:38:44Z","timestamp":1610969924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-33-4922-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813349216","9789813349223"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4922-3_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}