Foreword
At last! Finally, a book about building secure embedded systems.
Read the newspaper and you get an almost daily litany of stories about leaks and exploits. Credit card numbers seem to leap out of databases. Personal information spews from corporate servers.
But the elephant in the room, the real threat vector, has been largely ignored. For every PC in the world, there are hundreds of embedded systems, interconnected via an ever-growing array of communications channels. WiFi, Bluetooth, Ethernet, RFID, FireWire—the list is endless. A smartphone has at least four antennas and reflashable memory, and, if compromised, could be an electronic Typhoid Mary.
Anything with a connection can be a threat vector. A USB toothbrush (yes, at least one ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access