Safety & Security

Standards, regulations, and techniques for implementing safe and secure systems.

image

Countermeasures for security vulnerability in Androids

A permission based security technique which includes a close analysis of the Android operating system call invocations including IPC and RPC Read More

image

Heartbleed and its impact on embedded security

The majority of the news over the past few weeks about the Heartbleed bug in OpenSSL has focused on consumer usernames and passwords security. Read More

image

Protecting multicore designs without compromising performance

As data rates climb and malicious software attacks escalate, traditional approaches to security will be replaced by integrating such protection Read More

image

Using the Elliptic Curve Digital Signature Algorithm effectively

How the Elliptic Curve Digital Signature Algorithm (ECDSA) can be used to simplify management and protection of secret keys. Read More

image

Using innovative instructions to create trustworthy software solutions

A description of the Intel Software Guard Extensions (SGX), a new set of CPU instructions that give application and service providers of a variety Read More

image

Virtualizing the Trusted Execution Environment

Design of a hypervisor for a ARMv7 smartphone that virtualizes the underlying hardware as the primary means by which to create a Trusted Read More

image

The Impact of Vendor Customizations on Android Security

An analysis of vendor customizations of Android devices and an assessment of their impact on overall Android security and the sources of those issues Read More

image

Using static analysis to make open source Web applications more secure

A case study in how static analysis can be used to find and eliminate coding errors in three popular safety critical open source applications – Read More

image

Adding M2M security to RTOS-enabled MCUs, MPUs or FPGAs

A brief tutorial on adding security to any connected embedded design using machine-to-machine (M2M) connectivity protocols. Read More

image

Security issues in the Android cross-layer architecture

A systematic analysis of the interplay among the different layers of Android to provide a simple security model of the interaction among the Read More

image

Intent Based Security Challenges in Android

An overview of the the major Android security problems in its message passing system which while designed to create rich, collaborative apps, also Read More

image

Enforcing Multiple Security Policies for Android System

A security framework for Android which consists of both mandatory access control (MAC) in the kernel layer and role-based access control (RBAC) in Read More

image

Building more secure embedded software with code coverage analysis

The authors discuss how the use of code coverage techniques can improve the reliability and security of embedded software without necessarily Read More

image

Building a secure embedded development process

David and Mike Kleidermacher describe a much ignored aspect of developing secure software: the underlying software development process and tools that Read More

image

Adopting aerospace development and verification standards: Part 2 – Source/object code verification

The second in a two-part series on the adoption of the avionics industry’s comprehensive certification and verification process by other embedded Read More

image

Static vs. dynamic analysis for secure code development: Part 2

The strengths and weaknesses of dynamic code analysis in the development of secure C or C++ code.  Read More

prev

1 of 16

next
see all Safety & Security

Insights view all

  • Currently no items

Collections
Tech Papers
Webinars
Courses

3 Must-Follow Guidelines for Mitigating M2M Software Security Risks

Save & Follow 01 November 2013

This white paper discusses 3 guidelines... Read More

see all

Most Commented

  • Currently no items

Parts Search Datasheets.com

KNOWLEDGE CENTER