Staying one step ahead in embedded security at
By Bernard Cole
ESC/EELive 2014, embedded developers concerned about protecting their increasingly networked systems can
take advantage of an intensive three day track of classes on the latest in security technology.
Android malware and the smartphone security threat
A recent report from Alcatel-Lucent's Kindskight
Security Labs says that more than 11.6 million mobile devices are infected worldwide, and 60% of them are
App developers are weak link for Android security
A study from German university researchers found that 1,074 apps out of 13,500 free Android apps
analyzed had weak Secure Sockets Layer (SSL) implementation that could potentially make them vulnerable to
KFKI, Wibu AG team on integrated security for industrial
To deal with the many security challenges of the Industry 4.0 and the Internet of Things, the German
Research Center for Artificial Intelligence (DFKI) and Wibu Systems AG have launched an intensive cooperative
long term effort
Exploiting the security vulnerabilities of industrial
An analysis of various programmable logic controller intrusion methods and how
these techniques can be used to attack a PLC.
Security and vulnerability
assessment of Zigbee home area networks
An analysis of security and privacy issues of ZigBee implementations that power
utilities are currently being deployed for testing of wireless based Smart Grid networks with pilot
Testing the security of connected
industrial infrastructure systems and devices
Nate Kube of Wurldtech details the security pitfalls in the supervisory control and
data acquisition (SCADA) systems in industrial infrastructure.
Securing Mobile and Embedded
Devices: Encryption is not Security
Steven Yee of BSQUARE describes a comprehensive security strategy for
mobile and embedded devices that addresses all of the factors important in guaranteeing success, including
technical limits, hackers, and the behavior of your users.
Genivi and beyond: The future of in-vehicle
This two part article discusses next-generation infotainment system architectural approaches that
address automotive networking security issues from the ground up.
Adding M2M security to RTOS-enabled MCUs,
MPUs or FPGAs
A brief tutorial on adding security to any connected embedded design using machine-to-machine
(M2M) connectivity protocols.
Building a security-optimized
embedded design using protected key storage
A survey of the ways the security of an embedded microcontroller-based design can be
compromised and how such intellectual-property theft can be avoided.
Security fundamentals for embedded software
Even if your device is not connected to the Internet, you need to protect it from
malicious attacks. Here are some simple protections you can institute to make your system more