Embedded devices are increasingly connected to network resources for additional functionality with the ultimate goal of greater mission capability. Recently, security of connected devices is being scrutinized with highly publicized vulnerabilities of various consumer devices. While several domains are starting to publish new guidelines for cybersecurity
Topic: Embedded Systems
A recently observed piece of malware targeting embedded Linux systems can provide attackers with full control over the infected devices, ESET security researchers warn.
Carriers no longer want their speciality pizzas delivered in a box, fully baked with pre-determined toppings. In fact they figure that it is economical to purchase standard pizza ingredients wholesale, bake ginormous crusts and believe they can please their customers faster by delivering custom toppings by slice on demand. Network function virtualisation
Search-Lab, a Hungary-based security testing company that specializes in embedded systems, has identified more than 50 vulnerabilities in network-attached storage (NAS) and network video recorder (NVR) products from D-Link.
The software community has been trying to accurately estimate the size of software products for a long time and has searched for a metric that is objective, consistent, accurate, a good predictor of effort, and is obtainable with minimal resources,. This ideal metric would provide a common frame of reference to communicate and make decisions about software
The goal of this report is to describe the state-of-the-art of embedded software maintenance and provide a glimpse of state-of-the-practice embedded maintenance practices. Section 2 introduces the area of embedded software based on embedded systems, the implication of embedded software and some of its characteristics. Section 3 describes the more general