Don McIntyre

Learn More
The protection from software Trojans in embedded systems is a difficult problem. The only way a software Trojan can be inserted into an embedded system is if the embedded systems instruction code is behaviorally modified. Trojans can be introduced into the system via new software installation, updates, or application input data such as buffer overflows.(More)
In this paper we introduce an innovative application designed to make collaborative design review in the architectural and automotive domain more effective. For this purpose we present a system architecture which combines a variety of visualization technologies such as high resolution multi-tile displays, TabletPCs and head-mounted displays with innovative(More)
  • 1