Safety & Security

Standards, regulations, and techniques for implementing safe and secure systems.

image

Testing the security of connected industrial infrastructure systems and devices

Nate Kube of Wurldtech details the security pitfalls in the supervisory control and data acquisition (SCADA) systems in industrial infrastructure. He... Read More

image

Physically securing critical data with non-imprinting memory and hardware AES

In this Product How-To article, Maxim Integrated’s Swati Joshi reviews some of the problems securing electronic devices against attack and describes... Read More

image

Securing Android for warfare

Tim Skutt provides an analysis of the vulnerabilities limiting use of Android-based wireless smartphones and tablets in military conflicts, and what... Read More

image

An introduction to elliptic curve cryptography

Some of my research is focused on the implementation issues of elliptic curve cryptography on embedded systems. Since I often have to explain what... Read More

image

Protecting SCADA devices from threats and hackers

Alan Grau of Icon Labs describes the basics of building a simple firewall for embedded devices used in the Supervisory Control and Data Acquistion... Read More

image

Boost MCU security AND performance with hardware accelerated crypto

In this Product How-To article, TI’s Carlos Betancourt and Greg Turner describe how the hardware accelerated cryptography modules built in to the... Read More

image

Embedded safety trims system cost, size and development time

Enhancements to embedded processors have emerged to combat the shortcomings of traditional safety systems. Integrated embedded-hardware diagnostics... Read More

image

Enhance system security with better data-at-rest encryption

Embedded systems designers can protect sensitive data that's on a device's hard drive (data-at-rest) by using encryption techniques. Read More

image

Security fundamentals for embedded software

Even if your device is not connected to the Internet, you need to protect it from malicious attacks. Here are some simple protections you can... Read More

image

Securing your apps with Public Key Cryptography & Digital Signature

This article provides some basic information about the security mechanisms behind Public Key Cryptography with practical details on how it is used by... Read More

image

Understanding the security framework behind RSA SecurID

This article takes you through the two-factor authentication-base RSA SecurID security protocol – not to be confused with the RSA public key... Read More

image

Software forensics for embedded systems developers

In this chapter from his book "The Software IP Detective's Handbook," Bob Zeidman describes some of the concepts behind the new field of software... Read More

image

Securing nonvolatile, nonresettable counters in embedded designs

EEPROMs that include EPROM-emulation mode are the product of choice for implementing nonvolatile, nonresettable counters. The serial number of the... Read More

image

Functional safety poses challenges for semiconductor design

The ability to integrate multiple system-level functions into a single component has spurred work to apply functional safety techniques at the... Read More

image

Strategies for securing the smart grid

Every embedded system on a possible cyber attack path, from the smart appliance to the smart meter to the network concentrators, must be a secure... Read More

image

Dealing with the minutiae of fingerprint analysis

Fingerprint analysis involves using fingerprint sensors and sophisticated DSP-based image-processing algorithms. Here’s a description of the... Read More

prev

1 of 17

next
see all Safety & Security
Tech Papers
Webinars
Courses

Save & Follow 01 November 2012

China has already started cloud pilot programs in... Read More

see all

Most Commented

  • Currently no items

Parts Search Datasheets.com

KNOWLEDGE CENTER