Many safety-related and certification standards exist for developing safety-critical systems. Safety assessments are performed in practice, and system certification according to a...
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code me...
Commercial-Off-The-Shelf (COTS) software components are being used within complex safety-critical applications. However, to use them with confidence, it is necessary to ensure tha...
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Sensornets are being widely proposed as a solution technology in a wide number of applications, e.g. health care. As part of this work some key challenges for the safety and senso...