Emerging 2024
Emerging 2024
Emerging 2024
• Tightly constrained − All compu ng systems have constraints on design metrics, but those on an embedded system can be
especially tight.
• Design metrics is a measure of an implementation's features such as its cost, size, power, and performance.
• It must be of a size to fit on a single chip, must perform fast enough to process data in real time and consume minimum
power to extend battery life.
• Reac ve and Real me − Many embedded systems must con nually react to changes in the system's environment and
must compute certain results in real time without any delay.
• Consider an example of a car cruise controller; it continually monitors and reacts to speed and brake sensors.
• It must compute acceleration or de-accelerations repeatedly within a limited time; a delayed computation can result in
failure to control of the car.
• Microprocessors based − It must be microprocessor or
microcontroller based.
• Malware − In this form of cyber threat, a malicious program or so ware harms the user
significantly. It includes different types of spyware, viruses, bugs, etc.
• Back doors − In this system, a secret method is used to bypass the authen ca on or the
security process. They can result from poor design or configuration, but there are legit
systems that break down the protective security system to gain access to sensitive
information.
They are often tough to detect and are usually
discovered after a minute of checking the system.
• Spoofing is an act wherein malicious entities pretend to be authentic
by faking information to gain access to resources that they cannot
obtain otherwise.
• It is done through various applications like email spoofing, mac
spoofing, IP address spoofing, etc.