Design Con 2015

More about Embedded Security

January 01, 2009

Bernard Cole-January 01, 2009

For your convenience, collected here the most recent How-To and Technical Insight articles on Embedded.com on designing security into embedded devices and how to implement security in a variety of embdded designs in networks, industrial control and automotive applications. We are constantly updating this list, so check back occasionally to see what's new:

2008
What you need to know about embedded systems security
Ten questions you need to ask about embedded systems security, why you need to ask them and some answers.
Implement secure data transfer in portable handheld embedded devices
A three part tutorial provides and overview of the hardware and software security requirements in an embedded devices involved in secure digital data tranffer and how to prevent a variety of possible attacks.
Part 1: Security needs for data transfer
Part 2: Security needs within the device 
Part 3: Proprietary technologies for securing data transfer

Using the 802.1X standard to secure nextgen multimedia VoIP phones
How to use the 802.1x extensible authentication protocol to protect  advanced IP-based multimedia smarphones from hackers using network authentication before any regulr traffic data ocurs.
Implementation of the AES algorithm on a deeply pipelined DSP/RISC CPU
A more efficient Advanced Encryption Standard algorithm on a deeply pipelined  RSIC/DSP engine reduces pipeline stalls before its execution.
Planning your secure shell (SSH) implementation
A step by step guide to why and how to integrate SSH into your design and how to use it for tunneling and port forwarding over secure channels as well as for secure FTP file operations.
How to select an AES solution
To achieve higher data throughput, designers can use an ASIC or FPGA platform to provide hardware encryption/decryption acceleration.
Acceleration of symmetric key algorithms in software
A tutorial on symmetric key algorithms and some guidelines as to when, where and how to use software rather than hardware acceleration,
Hackers bite the (static analysis) dust: Part 2
Hackers bite the (static analysis) dust: Part 1
Described are common embedde system security vulnerabilities and how static analyzers can be use to detect and prevent some, but not all, common hacker tricks.
Static analysis stops on bugs
Static code analysis tools are becoming powerful tools for indenifying flaws and security breaches in complex code bases.
Safety, security set to drive embedded apps
There may be as many ways to implement safety and security in embedded apps as there are engineers working on the challenge as fail safe and secure technologies migrate to a wide range of designs beyond automotive and aerospace/mliitary.
Under the hood: SecureID fob - single chip safety net
Computer security. These words mask the complexity of a modern day issue important to both computer users and makers.
Virtualizing (and securing) embedded Linux
The system virtual machine can be used to make Linux based apps faster and more responsive and more secure.
Security goes embedded
As more embedded apps use the Internet Protocol, the need for security using encryptiondecription and authentication is trickling down to embedded devices.

< Previous
Page 1 of 4
Next >

Loading comments...

Most Commented

Parts Search Datasheets.com

KNOWLEDGE CENTER