{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:32Z","timestamp":1750308032881,"version":"3.41.0"},"reference-count":8,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2007,4,1]],"date-time":"2007-04-01T00:00:00Z","timestamp":1175385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGBED Rev."],"published-print":{"date-parts":[[2007,4]]},"abstract":"<jats:p>There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techniques for embedded systems design. However, existing modeling tools were not designed to meet the current and future security challenges of networked embedded systems. In this paper, we propose a framework to incorporate security modeling into embedded system design. We've developed a security analysis tool that can easily integrate with existing tool chains to create co-design environments that addresses security, functionality and system architecture aspects of embedded systems concurrently.<\/jats:p>","DOI":"10.1145\/1295464.1295466","type":"journal-article","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T16:11:36Z","timestamp":1192810296000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Embedded systems security co-design"],"prefix":"10.1145","volume":"4","author":[{"given":"Matthew","family":"Eby","sequence":"first","affiliation":[{"name":"Institute for Software Integrated Systems, Vanderbilt University, Nashville, TN"}]},{"given":"Jan","family":"Werner","sequence":"additional","affiliation":[{"name":"Institute for Software Integrated Systems, Vanderbilt University, Nashville, TN"}]},{"given":"Gabor","family":"Karsai","sequence":"additional","affiliation":[{"name":"Institute for Software Integrated Systems, Vanderbilt University, Nashville, TN"}]},{"given":"Akos","family":"Ledeczi","sequence":"additional","affiliation":[{"name":"Institute for Software Integrated Systems, Vanderbilt University, Nashville, TN"}]}],"member":"320","published-online":{"date-parts":[[2007,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.585163"},{"volume-title":"January, 2003.","author":"Karsai G.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","unstructured":"{3} Kevin Poulsen Slammer worm crashed Ohio nuke plant network August 19 2003. Available at http:\/\/www.securityfocus.com\/ news\/6767  {3} Kevin Poulsen Slammer worm crashed Ohio nuke plant network August 19 2003. Available at http:\/\/www.securityfocus.com\/ news\/6767"},{"key":"e_1_2_1_4_1","unstructured":"{4} Available from the Authors  {4} Available from the Authors"},{"key":"e_1_2_1_5_1","unstructured":"{5} Szemethy T. and Karsai G. 2004. Platform modeling and model transformations for analysis. Journal of Universal Computer Science 10 10 1383-1406.  {5} Szemethy T. and Karsai G. 2004. Platform modeling and model transformations for analysis. Journal of Universal Computer Science 10 10 1383-1406."},{"volume-title":"Mass.","year":"1975","author":"Bell L. J.","key":"e_1_2_1_6_1"},{"volume-title":"Report TR-3153. Bedford. Mass.","year":"1977","author":"Biba","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2007.45"}],"container-title":["ACM SIGBED Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1295464.1295466","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:14:08Z","timestamp":1750259648000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1295464.1295466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":8,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,4]]}},"alternative-id":["10.1145\/1295464.1295466"],"URL":"https:\/\/doi.org\/10.1145\/1295464.1295466","relation":{},"ISSN":["1551-3688"],"issn-type":[{"type":"electronic","value":"1551-3688"}],"subject":[],"published":{"date-parts":[[2007,4]]},"assertion":[{"value":"2007-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}