Book description
The ultimate resource for making embedded systems reliable, safe, and secure
Embedded Systems Security provides:
- A broad understanding of security principles, concerns, and technologies
- Proven techniques for the efficient development of safe and secure embedded software
- A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems
- Nuggets of practical advice and numerous case studies throughout
Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world’s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems.
This book is indispensable for embedded systems and security professionals, new and experienced.
An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market.
- Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group
Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology.
- Adriel Desautels, President and CTO, Netragard, LLC.
Security of embedded systems is more important than ever. The growth in networking is just one reason. However, many embedded systems developers have insufficient knowledge of how to achieve security in their systems. David Kleidermacher, a world-renowned expert in this field, shares in this book his knowledge and long experience with other engineers. A very important book at the right time.
- Prof. Dr.-Ing. Matthias Sturm, Leipzig University of Applied Sciences; Chairman, Embedded World Conference steering board
- Gain an understanding of the operating systems, microprocessors, and network security critical issues that must be considered when designing secure embedded systems
- Contains nuggets of practical and simple advice on critical issues highlighted throughout the text
- Short and to –the- point real case studies included to demonstrate embedded systems security in practice
Table of contents
- Cover Image
- Contents
- Title
- Dedication
- Copyright
- Foreword
- Preface
- Acknowledgements
- Chapter 1. Introduction to Embedded Systems Security
-
Chapter 2. Systems Software Considerations
- 2.1 The Role of the Operating System
- 2.2 Multiple Independent Levels of Security
- 2.3 Microkernel versus Monolith
- 2.4 Core Embedded Operating System Security Requirements
- 2.5 Access Control and Capabilities
- 2.6 Hypervisors and System Virtualization
- 2.7 I/O Virtualization
- 2.8 Remote Management
- 2.9 Assuring Integrity of the TCB
- 2.10 Key Points
- 2.11 Bibliography and Notes
-
Chapter 3. Secure Embedded Software Development
- 3.1 Introduction to PHASE—Principles of High-Assurance Software Engineering
- 3.2 Minimal Implementation
- 3.3 Component Architecture
- 3.4 Least Privilege
- 3.5 Secure Development Process
- 3.6 Independent Expert Validation
- 3.7 Case Study: HAWS—High-Assurance Web Server
- 3.8 Model-Driven Design
- 3.9 Key Points
- 3.10 Bibliography and Notes
-
Chapter 4. Embedded Cryptography
- 4.1 Introduction
- 4.2 U.S. Government Cryptographic Guidance
- 4.3 The One-Time Pad
- 4.4 Cryptographic Modes
- 4.5 Block Ciphers
- 4.6 Authenticated Encryption
- 4.7 Public Key Cryptography
- 4.8 Key Agreement
- 4.9 Public Key Authentication
- 4.10 Elliptic Curve Cryptography
- 4.11 Cryptographic Hashes
- 4.12 Message Authentication Codes
- 4.13 Random Number Generation
- 4.14 Key Management for Embedded Systems
- 4.15 Cryptographic Certifications
- 4.16 Key Points
- 4.17 Bibliography and Notes
- Chapter 5. Data Protection Protocols for Embedded Systems
- Chapter 6. Emerging Applications
- Index
Product information
- Title: Embedded Systems Security
- Author(s):
- Release date: April 2012
- Publisher(s): Newnes
- ISBN: 9780123868879
You might also like
book
Security Engineering, 3rd Edition
Now that there’s software in everything, how can you make anything secure? Understand how to engineer …
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
book
Container Security
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers …
book
The Hardware Hacking Handbook
Embedded devices are chip-size microcomputers small enough to be included in the structure of the object …