Indexed by:
Abstract:
Embedded real-time operating systems are widely used in communication, industrial control and weapon intelligent control and other fields. However, due to the complex personnel and environment involved in the development of embedded systems, the development software is difficult to control independently, so it is extremely vulnerable to malicious code implantation attacks. Based on this, this paper focuses on the UCOS real-time operating system, analyzes the security threats faced by the UCOS development environment GCC in the process of precompiling, compiling, assembling and linking, and designs a plug-in-based GCC attack mode, which can implement malicious code implantation attacks on UCOS. . At the same time, a trusted protection framework for embedded real-time systems is proposed. By implementing active control and integrity measurement of firmware, operating systems and applications in embedded real-time systems, the trusted startup of embedded real-time systems is guaranteed and the supply chain stage is independently resisted. malicious code implantation attack. © 2022 ACM.
Keyword:
Reprint Author's Address:
Email:
Source :
Year: 2022
Page: 64-68
Language: English
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count: 1
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 5
Affiliated Colleges: