Book description
"
As an engineer, you know that countless devices—from industrial components to smart household appliances—rely on embedded computer systems. But how do you balance the need for robust security with performance and innovative product design?
Engineering Secure Devices will guide you through crafting secure devices—from protecting crucial assets to the nature of attackers and the risks they pose. You’ll explore the technical intricacies and pros and cons of symmetric and asymmetric cryptography and learn how to use and analyze random number generators and cryptographic algorithms. You’ll learn how to ensure confidential data storage and secure memory, and devise secure device identity solutions and communication protocols to reinforce system architecture against potential threats. And finally, you’ll learn how to properly design secure boot and secure update processes, manage access control, and perform system monitoring to secure IoT devices.
Real-world case studies throughout highlight practical applications, solutions, and obstacles, such as firmware updates with SWUpdate, secure communication with MQTT, and advanced access control with AppArmor.
You’ll also dig into topics like:
- Analyzing the performance of cryptographic implementations in both hardware and software
- Considerations for secure boot and software update processes to ensure ongoing firmware integrity
- Designing robust device architectures that withstand attacks while maintaining critical operations
- Developing strategies to detect and respond to anomalies or security breaches in embedded systems
Whether you’re an IoT developer or an embedded system architect, Engineering Secure Devices equips you with the indispensable knowledge to design, secure, and support the next generation of smart devices—from webcams to four-legged robots.
"Publisher resources
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Technical Reviewer
- BRIEF CONTENTS
- CONTENTS IN DETAIL
- FOREWORD
- ACKNOWLEDGMENTS
- INTRODUCTION
- PART I FUNDAMENTALS
- 1 SECURE DEVELOPMENT PROCESS
- 2 CRYPTOGRAPHY
- PART II DEVICE SECURITY BUILDING BLOCKS
- 3 RANDOM NUMBER GENERATORS
- 4 CRYPTOGRAPHIC IMPLEMENTATIONS
- 5 CONFIDENTIAL DATA STORAGE AND SECURE MEMORY
- 6 SECURE DEVICE IDENTITY
- 7 SECURE COMMUNICATION
- PART III ADVANCED DEVICE SECURITY CONCEPTS
-
8 SECURE BOOT AND SYSTEM INTEGRITY
- System Boot Complexity
- Boot Protection Concepts
- Classic Secure Boot Chain
- Considerations for Implementing Secure Boot
- Open Source Licenses vs. Secure Boot
- Case Study: Secure Boot Process on an STM32MP157F Device
- Integrity Protection Beyond the Boot Process
- Write Protection as a Low-Cost Solution
- Summary
- 9 SECURE FIRMWARE UPDATE
- 10 ROBUST DEVICE ARCHITECTURE
- 11 ACCESS CONTROL AND MANAGEMENT
- 12 SYSTEM MONITORING
- AFTERWORD
- INDEX
Product information
- Title: Engineering Secure Devices
- Author(s):
- Release date: July 2024
- Publisher(s): No Starch Press
- ISBN: 9781718503489
You might also like
article
Managing Encryption Keys
This collection of shortcuts provides a practical and concise guide to securing cloud environments. It covers …
article
Use Github Copilot for Prompt Engineering
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
article
Run Llama-2 Models Locally with llama.cpp
Llama is Meta’s answer to the growing demand for LLMs. Unlike its well-known technological relative, ChatGPT, …