Embedded systems security practical methods for safe and secure software and systems development
The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software A study of the system...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Amsterdam :
Elsevier
2012.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628857306719 |
Tabla de Contenidos:
- Front Cover; Dedication; Embedded Systems Security: Practical Methods for Safe and Secure Softwareand Systems Development; Copyright; Contents; Foreword; Preface; About this Book; Audience; Organization; Approach; Acknowledgements; Chapter 1 - Introduction to Embedded Systems Security; 1.1What is Security?; 1.2What is an Embedded System?; 1.3Embedded Security Trends; 1.4Security Policies; 1.5Security Threats; 1.6Wrap-up; 1.7Key Points; 1.8 Bibliography and Notes; Chapter 2 - Systems Software Considerations; 2.1The Role of the Operating System; 2.2Multiple Independent Levels of Security
- 2.3Microkernel versus Monolith2.4Core Embedded Operating System Security Requirements; 2.5Access Control and Capabilities; 2.6Hypervisors and System Virtualization; 2.7I/O Virtualization; 2.8Remote Management; 2.9Assuring Integrity of the TCB; 2.10Key Points; 2.11 Bibliography and Notes; Chapter 3 - Secure Embedded Software Development; 3.1Introduction to PHASE-Principles of High-Assurance Software Engineering; 3.2Minimal Implementation; 3.3Component Architecture; 3.4Least Privilege; 3.5Secure Development Process; 3.6Independent Expert Validation; 3.7Case Study: HAWS-High-Assurance Web Server
- 3.8Model-Driven Design3.9Key Points; 3.10 Bibliography and Notes; Chapter 4 - Embedded Cryptography; 4.1Introduction; 4.2U.S. Government Cryptographic Guidance; 4.3The One-Time Pad; 4.4Cryptographic Modes; 4.5Block Ciphers; 4.6Authenticated Encryption; 4.7Public Key Cryptography; 4.8Key Agreement; 4.9Public Key Authentication; 4.10Elliptic Curve Cryptography; 4.11Cryptographic Hashes; 4.12Message Authentication Codes; 4.13Random Number Generation; 4.14Key Management for Embedded Systems; 4.15Cryptographic Certifications; 4.16Key Points; 4.17 Bibliography and Notes
- Chapter 5 - Data Protection Protocols for Embedded Systems5.1Introduction; 5.2Data-in-Motion Protocols; 5.3Data-at-Rest Protocols; 5.4Key Points; 5.5 Bibliography and Notes; Chapter 6 - Emerging Applications; 6.1Embedded Network Transactions; 6.2Automotive Security; 6.3Secure Android; 6.4Next-Generation Software-Defined Radio; 6.5Key Points; 6.6 Bibliography and Notes; Index