Academic literature on the topic 'Firmware and software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firmware and software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Firmware and software"

1

Yang, Le Kang, Di Chen, Ju Mei, and Liang Xue. "Research on Malicious Behavior of Firmware Based on Hardware Resources Access Control." Applied Mechanics and Materials 340 (July 2013): 737–43. http://dx.doi.org/10.4028/www.scientific.net/amm.340.737.

Full text
Abstract:
As same as the traditional application and system software, firmware also faced the risk of malicious code like hobbyhorse, back door, logical bomb and so on. Firmware exhibited strong cohesion and hardware relativity, which make the malicious action in firmware to be different from that in the traditional software. This paper analyzed the specificities of firmware and the malicious behaviour about it, then expatiate the essence of the malicious behaviour of the firmware, and presented a firmware formal definition and detecting method which was based on the hardware resources access control policy. Experimental results proved that the method was effective to detect the malicious firmware.
APA, Harvard, Vancouver, ISO, and other styles
2

Weisi Lin. "On fast firmware/software-based video coding." IEEE Transactions on Consumer Electronics 48, no. 2 (2002): 209–19. http://dx.doi.org/10.1109/tce.2002.1010124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

ZHANG, TIELING, MIN XIE, LOON CHING TANG, and SZU HUI NG. "RELIABILITY AND MODELING OF SYSTEMS INTEGRATED WITH FIRMWARE AND HARDWARE." International Journal of Reliability, Quality and Safety Engineering 12, no. 03 (2005): 227–39. http://dx.doi.org/10.1142/s021853930500180x.

Full text
Abstract:
Firmware is embedded software in hardware devices and they play important role for many critical systems' function. Firmware failure rate in operation should be quite lower than the application software which is operating on it. Most of the study on software reliability deals with systems during development, and it is also important to study the integrated system during operation. Complex systems usually have a bathtub-shaped failure rate over the lifecycle of the product. This paper discusses the parametric analysis of model given by Haupt and Schäbe (1992), exponentiated Weibull distribution and models generated from Pareto and Weibull distribution, as well as their possible application to modeling firmware system failure. In addition, the Safety Integrity Levels (SIL) stipulated in IEC 61508 are taken into account in the modeling since the safety-critical systems in general are firmware-dominated.
APA, Harvard, Vancouver, ISO, and other styles
4

Iuganson, Andrei, and Danil Zakoldaev. "Approach to assessment of firmware security under fuzzy input data." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (2020): 50–56. http://dx.doi.org/10.24143/2072-9502-2020-1-50-56.

Full text
Abstract:
The article highlights the issues of security and software security, which turn to be secondary in the design and development of software tools in order to please the speedy launch 
 of the software product on the market. Due to the fact that the cost of eliminating security defects is higher in the late stages of design, the scientific problem of assessing software security under high uncertainty has been considered. The functional requirements for security of the firmware are given. A new approach is proposed for assessing the firmware security. The subject of research is a firmware designed to control various devices and microcontrollers. Based on GOST R 56939-2016 “Information security. Secure software development. General requirements” there have been developed the security requirements (qualitative and quantitative) for the embedded software, the assessment of which allows determining the level of security of the firmware as a whole. The fuzzy logic apparatus was used to optimize the assessment process in conditions of possible uncertainty, inconsistency, incompleteness and qualitative nature of the input data. The proposed method will help minimize the economic risks at the stages of operation and maintenance of embedded systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Dasgupta, S., P. A. Wilsey, and J. Heinanen. "Axiomatic Specifications in Firmware Development Systems." IEEE Software 3, no. 4 (1986): 49–58. http://dx.doi.org/10.1109/ms.1986.234068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pott, Claudius, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, and Marco Siebert. "Firmware Security Module." Journal of Hardware and Systems Security 5, no. 2 (2021): 103–13. http://dx.doi.org/10.1007/s41635-021-00114-4.

Full text
Abstract:
AbstractNew services such as autonomous driving, the connectivity of the traffic infrastructure and the tight coupling of user operated smart devices with the vehicle have significantly increased the demand for cryptographic protection in the automobile. To provide a secure environment for the calculation and verification of cryptographic material, automotive microcontrollers now frequently integrate Hardware Security Modules (HSM), special well-protected co-processors, which are protected against manipulation and external access. HSMs use special hardware accelerators to provide the required cryptographic services. While these accelerators provide good performance, they limit flexibility and updatability. In addition, as more services require cryptographic protection, the amount of key material that needs to be managed by the HSM also increases, turning the limited protected memory of the HSM into a bottleneck. This paper presents a framework that uses the safety mechanisms of a microcontroller to achieve both HSM-equivalent security through software solutions, while providing an equivalent level of functionality. Furthermore, the proposed framework provides crypto-agility, as the security stack can be updated if desired. In order to verify the functionality, the presented framework is implemented and evaluated on an Infineon AURIX TC399 and compared with the integrated HSM.
APA, Harvard, Vancouver, ISO, and other styles
7

Eckert, Brad. "Firmware factory & forth." ACM SIGPLAN Notices 34, no. 12 (1999): 30–33. http://dx.doi.org/10.1145/344283.344290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Witanto, Elizabeth Nathania, Yustus Eko Oktian, Sang-Gon Lee, and Jin-Heung Lee. "A Blockchain-Based OCF Firmware Update for IoT Devices." Applied Sciences 10, no. 19 (2020): 6744. http://dx.doi.org/10.3390/app10196744.

Full text
Abstract:
As the usage growth rate of Internet of Things (IoT) devices is increasing, various issues related to these devices need attention. One of them is the distribution of the IoT firmware update. The IoT devices’ software development does not end when the manufacturer sells the devices to the market. It still needs to be kept updated to prevent cyber-attacks. The commonly used firmware update process, over-the-air (OTA), mostly happens in a centralized way, in which the IoT devices directly download the firmware update from the manufacturer’s server. This central architecture makes the manufacturer’s server vulnerable to single-point-of-failure and latency issues that can delay critical patches from being applied to vulnerable devices. The Open Connectivity Foundation (OCF) is one organization contributing to providing interoperability services for IoT devices. In one of their subject areas, they provide a firmware update protocol for IoT devices. However, their firmware update process does not ensure the integrity and security of the patches. In this paper, we propose a blockchain-based OCF firmware update for IoT devices. Specifically, we introduce two types of firmware update protocol, direct and peer-to-peer updates, integrated into OCF firmware update specifications. In the direct scenario, the device, through the IoT gateway, can download the new firmware update from the manufacturer’s server. Meanwhile, in the peer-to-peer scheme, the device can query the update from the nearby gateways. We implemented our protocol using Raspberry Pi hardware and Ethereum-based blockchain with the smart contracts to record metadata of the manufacturer’s firmware updates. We evaluated the proposed system’s performance by measuring the average throughput, the latency, and the firmware update distribution’s duration. The analysis results indicate that our proposal can deliver firmware updates in a reasonable duration, with the peer-to-peer version having a faster completion time than the direct one.
APA, Harvard, Vancouver, ISO, and other styles
9

Ghanathe, N. P., A. Madorsky, H. Lam, et al. "Software and firmware co-development using high-level synthesis." Journal of Instrumentation 12, no. 01 (2017): C01083. http://dx.doi.org/10.1088/1748-0221/12/01/c01083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abu-Nimeh, Faisal T., Jennifer Ito, William W. Moses, Qiyu Peng, and Woon-Seng Choong. "Architecture and Implementation of OpenPET Firmware and Embedded Software." IEEE Transactions on Nuclear Science 63, no. 2 (2016): 620–29. http://dx.doi.org/10.1109/tns.2015.2499600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography