<p><span>This book covers a wide range of challenges, technologies and state-of-the-art for the design, development and realization of smart and complex embedded systems and their applications; i.e., software and hardware development, with the use of digital technologies, and quality assurance for c
Secure Smart Embedded Devices, Platforms and Applications
β Scribed by Keith Mayes, Konstantinos Markantonakis (auth.), Konstantinos Markantonakis, Keith Mayes (eds.)
- Publisher
- Springer-Verlag New York
- Year
- 2014
- Tongue
- English
- Leaves
- 585
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues.
The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.
β¦ Table of Contents
Front Matter....Pages i-xli
Front Matter....Pages 1-1
An Introduction to Smart Cards and RFIDs....Pages 3-25
Embedded DSP Devices....Pages 27-48
Microprocessors and Microcontrollers Security....Pages 49-69
An Introduction to the Trusted Platform Module and Mobile Trusted Module....Pages 71-93
Hardware and VLSI Designs....Pages 95-116
Front Matter....Pages 117-117
Information Security Best Practices....Pages 119-144
Smart Card Security....Pages 145-177
Graphics Processing Units....Pages 179-200
A Survey of Recent Results in FPGA Security and Intellectual Property Protection....Pages 201-224
Front Matter....Pages 225-225
Mobile Communication Security Controllers....Pages 227-266
Security of Embedded Location Systems....Pages 267-286
Automotive Embedded Systems Applications and Platform Embedded Security Requirements....Pages 287-309
Analysis of Potential Vulnerabilities in Payment Terminals....Pages 311-333
Wireless Sensor Nodes....Pages 335-350
Near Field Communication....Pages 351-367
The BIOS and Rootkits....Pages 369-381
Hardware Security Modules....Pages 383-405
Security Evaluation and Common Criteria....Pages 407-427
Physical Security Primitives....Pages 429-449
SCADA System Cyber Security....Pages 451-471
Front Matter....Pages 473-473
An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms....Pages 475-495
An Introduction to Java Card Programming....Pages 497-513
A Practical Example of Mobile Phone Application Using SATSA (JSR 177) API....Pages 515-539
Wireless Sensors (Languages/Programming/Developments Tools/Examples)....Pages 541-564
Errata to: Secure Smart Embedded Devices, Platforms and Applications....Pages E1-E2
Errata to: Secure Smart Embedded Devices, Platforms and Applications....Pages E3-E14
Back Matter....Pages 565-568
β¦ Subjects
Systems and Data Security; Data Structures, Cryptology and Information Theory; Information Systems Applications (incl. Internet); Computer Systems Organization and Communication Networks; Communications Engineering, Networks
π SIMILAR VOLUMES
<p><p><em><strong>Platform Embedded Security Technology Revealed </strong></em>is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The
<span>In recent years, smart devices have become commonplace in our daily lives. On the internet of things (IoT), these devices powered new intelligent services. Their application enabled the rise of intelligent cities, smart agriculture, and Industry 4.0. However, smart devices collect and share la
"Smart Embedded Systems: Advances and Applications" is a comprehensive guide that demystifies the complex world of embedded technology. The book journeys through a wide range of topics from healthcare to energy management, autonomous robotics, and wireless communication, showcasing the transformativ
<p><P>Security in Embedded Devices</P><P>Cathy Gebotys</P><P></P><P></P><P></P><P>Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system de
<p><span>Recent technological developments in sensors, edge computing, connectivity, and artificial intelligence (AI) technologies have accelerated the integration of data analysis based on embedded AI capabilities into resource-constrained, energy-efficient hardware devices for processing informati