CHAPTER 5 Embedded Security
In this chapter, we delve into the embedded realm. In this chapter, we will cover security from an embedded systems developer’s point of view. First and foremost, the primary concept that will be introduced here and reinforced throughout the text is that the embedded systems we are covering are NOT PCs or expensive devices running Windows or Linux (see Figure 1). The personal computer and many expensive embedded devices have virtually infinite resources when compared to low-power, inexpensive, embedded platforms. The problem is that many security solutions rely on this almost limitless supply of memory and clock cycles. Cryptography is expensive, and the flexibility of some protocols (for example, allowing multiple ...
Get Practical Embedded Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.