Software tampering detection in embedded systems - A systematic literature review

Abdo Ali Abdullah Al-Wosabi, Zarina Shukur

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Embedded systems (ES) become available anywhere and anytime as an established part of our daily routines. Their usage in sense, store, process, and transfer our personal and private data, such as ATM card, modern cars system, mobile phones, and etc., become irreplaceable. Developers of these systems face significant challenges in code and information security. Whereas, software tampering is one of these challenges, code integrity detection is one of the main approaches used to defeat it. Checking code integrity achieves tamper proofing by method of identification of unauthorized alteration to recognize any tampered code is executed or tampered data are used. For the purpose of this paper, we perform a research methodology based on systematic literature reviews in-order to present different techniques/approaches of code integrity checking in embedded systems. We briefly survey a number of research studies (specifically between 2008 and 2014) related to this issue and present their proposed solutions. Obviously, there is no complete solution, and our aim by conducting this review is to contribute (even a modest effort) on fighting against software tampering.

Original languageEnglish
Pages (from-to)211-221
Number of pages11
JournalJournal of Theoretical and Applied Information Technology
Volume76
Issue number2
Publication statusPublished - 2015
Externally publishedYes

Fingerprint

Literature Review
Embedded systems
Embedded Systems
Software
Integrity
Automatic teller machines
Security of data
Mobile phones
Railroad cars
Information Security
Mobile Phone
Methodology

Keywords

  • Embedded systems
  • Software integrity
  • Software tampering
  • Tampering detection

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Software tampering detection in embedded systems - A systematic literature review. / Al-Wosabi, Abdo Ali Abdullah; Shukur, Zarina.

In: Journal of Theoretical and Applied Information Technology, Vol. 76, No. 2, 2015, p. 211-221.

Research output: Contribution to journalArticle

@article{4284e1019b814ddca251dec63081b185,
title = "Software tampering detection in embedded systems - A systematic literature review",
abstract = "Embedded systems (ES) become available anywhere and anytime as an established part of our daily routines. Their usage in sense, store, process, and transfer our personal and private data, such as ATM card, modern cars system, mobile phones, and etc., become irreplaceable. Developers of these systems face significant challenges in code and information security. Whereas, software tampering is one of these challenges, code integrity detection is one of the main approaches used to defeat it. Checking code integrity achieves tamper proofing by method of identification of unauthorized alteration to recognize any tampered code is executed or tampered data are used. For the purpose of this paper, we perform a research methodology based on systematic literature reviews in-order to present different techniques/approaches of code integrity checking in embedded systems. We briefly survey a number of research studies (specifically between 2008 and 2014) related to this issue and present their proposed solutions. Obviously, there is no complete solution, and our aim by conducting this review is to contribute (even a modest effort) on fighting against software tampering.",
keywords = "Embedded systems, Software integrity, Software tampering, Tampering detection",
author = "Al-Wosabi, {Abdo Ali Abdullah} and Zarina Shukur",
year = "2015",
language = "English",
volume = "76",
pages = "211--221",
journal = "Journal of Theoretical and Applied Information Technology",
issn = "1992-8645",
publisher = "Asian Research Publishing Network (ARPN)",
number = "2",

}

TY - JOUR

T1 - Software tampering detection in embedded systems - A systematic literature review

AU - Al-Wosabi, Abdo Ali Abdullah

AU - Shukur, Zarina

PY - 2015

Y1 - 2015

N2 - Embedded systems (ES) become available anywhere and anytime as an established part of our daily routines. Their usage in sense, store, process, and transfer our personal and private data, such as ATM card, modern cars system, mobile phones, and etc., become irreplaceable. Developers of these systems face significant challenges in code and information security. Whereas, software tampering is one of these challenges, code integrity detection is one of the main approaches used to defeat it. Checking code integrity achieves tamper proofing by method of identification of unauthorized alteration to recognize any tampered code is executed or tampered data are used. For the purpose of this paper, we perform a research methodology based on systematic literature reviews in-order to present different techniques/approaches of code integrity checking in embedded systems. We briefly survey a number of research studies (specifically between 2008 and 2014) related to this issue and present their proposed solutions. Obviously, there is no complete solution, and our aim by conducting this review is to contribute (even a modest effort) on fighting against software tampering.

AB - Embedded systems (ES) become available anywhere and anytime as an established part of our daily routines. Their usage in sense, store, process, and transfer our personal and private data, such as ATM card, modern cars system, mobile phones, and etc., become irreplaceable. Developers of these systems face significant challenges in code and information security. Whereas, software tampering is one of these challenges, code integrity detection is one of the main approaches used to defeat it. Checking code integrity achieves tamper proofing by method of identification of unauthorized alteration to recognize any tampered code is executed or tampered data are used. For the purpose of this paper, we perform a research methodology based on systematic literature reviews in-order to present different techniques/approaches of code integrity checking in embedded systems. We briefly survey a number of research studies (specifically between 2008 and 2014) related to this issue and present their proposed solutions. Obviously, there is no complete solution, and our aim by conducting this review is to contribute (even a modest effort) on fighting against software tampering.

KW - Embedded systems

KW - Software integrity

KW - Software tampering

KW - Tampering detection

UR - http://www.scopus.com/inward/record.url?scp=84932141432&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84932141432&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84932141432

VL - 76

SP - 211

EP - 221

JO - Journal of Theoretical and Applied Information Technology

JF - Journal of Theoretical and Applied Information Technology

SN - 1992-8645

IS - 2

ER -