Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

Johannes Loinig, Christian Steger, Reinhold Weiß, Ernst Haselsteiner

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Originalsprachedeutsch
TitelInformation Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
Herausgeber (Verlag)Springer Berlin - Heidelberg
Seiten316-323
ISBN (Print)978-3-642-12367-2
DOIs
PublikationsstatusVeröffentlicht - 2010
VeranstaltungWorkshop in Information Security Theory and Practices - Passau, Deutschland
Dauer: 12 Apr 201014 Apr 2010

Publikationsreihe

NameLecture Notes in Computer Science
Herausgeber (Verlag)Springer Berlin / Heidelberg

Konferenz

KonferenzWorkshop in Information Security Theory and Practices
LandDeutschland
OrtPassau
Zeitraum12/04/1014/04/10

Fields of Expertise

  • Information, Communication & Computing

Dies zitieren

Loinig, J., Steger, C., Weiß, R., & Haselsteiner, E. (2010). Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. in Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices (S. 316-323). (Lecture Notes in Computer Science). Springer Berlin - Heidelberg. https://doi.org/10.1007/978-3-642-12368-9

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. / Loinig, Johannes; Steger, Christian; Weiß, Reinhold; Haselsteiner, Ernst.

Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Springer Berlin - Heidelberg, 2010. S. 316-323 (Lecture Notes in Computer Science).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Loinig, J, Steger, C, Weiß, R & Haselsteiner, E 2010, Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. in Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Lecture Notes in Computer Science, Springer Berlin - Heidelberg, S. 316-323, Passau, Deutschland, 12/04/10. https://doi.org/10.1007/978-3-642-12368-9
Loinig J, Steger C, Weiß R, Haselsteiner E. Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. in Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Springer Berlin - Heidelberg. 2010. S. 316-323. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-642-12368-9
Loinig, Johannes ; Steger, Christian ; Weiß, Reinhold ; Haselsteiner, Ernst. / Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Springer Berlin - Heidelberg, 2010. S. 316-323 (Lecture Notes in Computer Science).
@inproceedings{2571366ec1174c71bc0d947d40a67f75,
title = "Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions",
author = "Johannes Loinig and Christian Steger and Reinhold Wei{\ss} and Ernst Haselsteiner",
year = "2010",
doi = "10.1007/978-3-642-12368-9",
language = "deutsch",
isbn = "978-3-642-12367-2",
series = "Lecture Notes in Computer Science",
publisher = "Springer Berlin - Heidelberg",
pages = "316--323",
booktitle = "Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices",

}

TY - GEN

T1 - Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

AU - Loinig, Johannes

AU - Steger, Christian

AU - Weiß, Reinhold

AU - Haselsteiner, Ernst

PY - 2010

Y1 - 2010

UR - http://www.springerlink.com/content/c151577613237m13/?p=afef4972a4d741f2b5e374c174a03123&pi=0

U2 - 10.1007/978-3-642-12368-9

DO - 10.1007/978-3-642-12368-9

M3 - Beitrag in einem Konferenzband

SN - 978-3-642-12367-2

T3 - Lecture Notes in Computer Science

SP - 316

EP - 323

BT - Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices

PB - Springer Berlin - Heidelberg

ER -