Embedding security protection in hardware

As both the number of connected devices and the security dangers facing them increase apace, speakers at the 2014 DAC this week are focused on hardware architectures that either replace or enhance current software-based solutions.

Building a security-optimized embedded design using protected key storage

A survey of the ways the security of an embedded microcontroller-based design can be compromised and how such intellectual-property theft can be avoided.

Trusted remote attestation for secure embedded systems

How to make sure code and data on remote embedded devices distributed over a network can be trusted.

Physically securing critical data with non-imprinting memory and hardware AES

In this Product How-To article, Maxim Integrated’s Swati Joshi reviews some of the problems securing electronic devices against attack and describes how the company’s MAX36025 tamper-reactive cryptographic-node controller deals with such issues.

Locking Down Intellectual Property in Embedded Systems

This article focuses on methods of securing IP in embedded systems, past and current approaches and looks ahead to new options for developers wanting to protect their IP.

Efficient isolation of trusted subsystems in embedded systems

A generic and very lightweight hardware mechanism that can support an efficient implementation of secure and trusted isolation for several subsystems that share the same processor and memory space.

Using innovative instructions to create trustworthy software solutions

A description of the Intel Software Guard Extensions (SGX), a new set of CPU instructions that give application and service providers of a variety of mobile and connected embedded devices a safe place to stand when managing the use of the data they consume and collect.

What security properties can my mobile platform give me?

Best practices for making the most of mobile hardware-based security features and how to make them more readily accessible to application software developers without compromising the security of their existing uses.

Securing Trusted Execution Environments with PUF generated secret keys

A method by which to use a physically unclonable function (PUF) generated AES key to not only protect the trusted execution environment on a mobile device but provide a mechanism for its expansion and customization.

Virtualizing the Trusted Execution Environment

Design of a hypervisor for a ARMv7 smartphone that virtualizes the underlying hardware as the primary means by which to create a Trusted Execution Environment that provides isolation and adds a secondary isolation layer based on TrustZone.

Using cryptography to secure embedded device authentication profiles: Part 1

This two part series addresses the use of cryptography for the purpose of product authentication, whether it be a physical item or a logical block of firmware, and the key size necessary to be confident that it will not be guessed. Part 1: the basics of authentication

Securing SoC Platform Oriented Architectures with a hardware Root of Trust

As platform-oriented-architecture-based devices incorporate the product feature and service configuration and management the need to secure them and the systems they support makes a hardware-based "root of trust" a critical requirement.

Educational Resources

This e-mail was sent to EmailAddress

Go to Embedded.com
Privacy Policy I Advertising Information I Unsubscribe
Embedded, 2901 28th Street, Suite 100 Santa Monica, CA 90405