Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

Johannes Loinig, Christian Steger, Reinhold Weiß, Ernst Haselsteiner

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

LanguageGerman
Title of host publicationInformation Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
PublisherSpringer Berlin - Heidelberg
Pages316-323
ISBN (Print)978-3-642-12367-2
DOIs
StatusPublished - 2010
EventWorkshop in Information Security Theory and Practices - Passau, Germany
Duration: 12 Apr 201014 Apr 2010

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Berlin / Heidelberg

Conference

ConferenceWorkshop in Information Security Theory and Practices
CountryGermany
CityPassau
Period12/04/1014/04/10

Fields of Expertise

  • Information, Communication & Computing

Cite this

Loinig, J., Steger, C., Weiß, R., & Haselsteiner, E. (2010). Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. In Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices (pp. 316-323). (Lecture Notes in Computer Science). Springer Berlin - Heidelberg. DOI: 10.1007/978-3-642-12368-9

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. / Loinig, Johannes; Steger, Christian; Weiß, Reinhold; Haselsteiner, Ernst.

Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Springer Berlin - Heidelberg, 2010. p. 316-323 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Loinig, J, Steger, C, Weiß, R & Haselsteiner, E 2010, Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. in Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Lecture Notes in Computer Science, Springer Berlin - Heidelberg, pp. 316-323, Workshop in Information Security Theory and Practices, Passau, Germany, 12/04/10. DOI: 10.1007/978-3-642-12368-9
Loinig J, Steger C, Weiß R, Haselsteiner E. Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. In Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Springer Berlin - Heidelberg. 2010. p. 316-323. (Lecture Notes in Computer Science). Available from, DOI: 10.1007/978-3-642-12368-9
Loinig, Johannes ; Steger, Christian ; Weiß, Reinhold ; Haselsteiner, Ernst. / Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. Springer Berlin - Heidelberg, 2010. pp. 316-323 (Lecture Notes in Computer Science).
@inproceedings{2571366ec1174c71bc0d947d40a67f75,
title = "Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions",
author = "Johannes Loinig and Christian Steger and Reinhold Wei{\ss} and Ernst Haselsteiner",
year = "2010",
doi = "10.1007/978-3-642-12368-9",
language = "deutsch",
isbn = "978-3-642-12367-2",
series = "Lecture Notes in Computer Science",
publisher = "Springer Berlin - Heidelberg",
pages = "316--323",
booktitle = "Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices",

}

TY - GEN

T1 - Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

AU - Loinig,Johannes

AU - Steger,Christian

AU - Weiß,Reinhold

AU - Haselsteiner,Ernst

PY - 2010

Y1 - 2010

UR - http://www.springerlink.com/content/c151577613237m13/?p=afef4972a4d741f2b5e374c174a03123&pi=0

U2 - 10.1007/978-3-642-12368-9

DO - 10.1007/978-3-642-12368-9

M3 - Beitrag in einem Konferenzband

SN - 978-3-642-12367-2

T3 - Lecture Notes in Computer Science

SP - 316

EP - 323

BT - Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices

PB - Springer Berlin - Heidelberg

ER -