Download presentation
Presentation is loading. Please wait.
Published byMark Fletcher Modified over 5 years ago
1
Adversary Models Do we need new adversary models for embedded systems and networks? What should be this adversary model? What are the new threats? Incorporate characteristics of embedded systems and networks? Can we enumerate all the treats? Can we develop a universal adversary model? Superset of all possible adversary models Can we develop a process or methodology to identify new threats to new technologies? What else? Virgil v.s. Kang v.s. Radha v.s. Gene v.s. … Performance/security metrics Countermeasures …
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.