Practical embedded security building secure resource-constrained systems
The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Elsevier/Newnes
c2008.
|
Edición: | 1st edition |
Colección: | Embedded technology series.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627209906719 |
Tabla de Contenidos:
- Front cover; Practical Embedded Security; Copyright page; Table of contents; Preface; CHAPTER 1: Computer Security Introduction and Review; What Is Security?; What Can We Do?; Access Control and the Origins of Computer Security Theory; Security Policies; Cryptography; Data Integrity and Authentication; Wrap-Up; Recommended Reading; CHAPTER 2: Network Communications Protocols and Built-in Security; Low-Level Communications; Transport and Internet Layer Protocols; Other Network Protocols; Wrap-Up: Network Communications; CHAPTER 3: Security Protocols and Algorithms; Protocol Madness
- Standardizing Security-A Brief HistoryStandardized Security in Practice; Cryptography and Protocols; Other Security Protocols; CHAPTER 4: The Secure Sockets Layer; SSL History; Pesky PKI; PKI Alternatives; SSL Under the Hood; The SSL Session; SSL in Practice; Wrap-Up; CHAPTER 5: Embedded Security; Networked Embedded Systems and Resource Constraints; Embedded Security Design; The KISS Principle; Modularity Is Key; Pick and Pull; Justification; Wrap-Up; CHAPTER 6: Wireless; Wireless Technologies; Bluetooth; ZigBee; Wireless Technologies and the Future; Wrap-Up
- CHAPTER 7: Application-Layer and Client/Server ProtocolsIntroduction; The World Wide Web; Web-Based Interfaces; Server-Side HTTP Web Interfaces; HTTP Client Web Interfaces; Combination Client/Server HTTP Applications; Console Applications; File Transfer Protocol; Email, DNS, DHCP, and SNMP; Wrap-Up; CHAPTER 8: Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems; Do We Need Cryptography?; Hashing-Low Security, High Performance; To Optimize or Not to Optimize · · ·; Choosing Cryptographic Algorithms; Tailoring Security for Your Application; Wrap-Up
- CHAPTER 9: Hardware-Based SecurityHigh Performance in Silicon; Wrap-Up: Security and Hardware; CHAPTER 10: Conclusion-Miscellaneous Security Issues and the Future of Embedded Applications Security; Programming Languages and Security; Dealing with Attacks; The Future of Security; Wrap-Up; CHAPTER 11: PIC Case Study; Microchip PIC with Ethernet Controller; PIC Example Application-Secure LED Blinking; CHAPTER 12: Rabbit Case Study; Rabbit 4000 CPU with Dynamic C; The History of Rabbit; Software on the Rabbit; Rabbit Case Study-Internet Enabled Vending Machine; Putting It All Together
- The PC SideWrap-Up: A Secure Rabbit; APPENDIX A: Source Listings; PIC Example Source Code (Main Program); Index