ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Methodology for Improving Security Issues and Reducing Vulnerability in Microprocessors

Journal: International Journal of Advances in Agricultural Science and Technology (IJAAST) (Vol.3, No. 6)

Publication Date:

Authors : ; ;

Page : 60-65

Keywords : Embedded Processor; embedded systems; attacks; vulnerability; microprocessors; security and reliability;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Many DoD systems require the use of embedded computing. An embedded computer system is designed for a dedicated function, in contrast to a general-purpose computer system, e.g., a desktop computer, which is designed for multiple functions. An ideal design for an embedded system optimizes performance, e.g., small form factor, low power consumption, and high throughput, while providing the specific functionality demanded by the system's purpose, i.e., its mission. Testing is also introduced to clear the bug which is presented in the network application software. It will improve the coverage of the test, clearly saving in cost and development time. The virus detection and testing processor also protect the multi core systems from Real Time attacks and will provide the formal model?based test for multi core system. With the model a test suite can be extracted from the test case generator and a test program generator will generate test programs automatically. In this paper a detailed research on methodology for improving security issues and reducing vulnerability in microprocessors has been entailed.

Last modified: 2016-12-13 16:49:34