This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book pro
Security in Embedded Devices
โ Scribed by Catherine H. Gebotys (auth.)
- Publisher
- Springer US
- Year
- 2010
- Tongue
- English
- Leaves
- 300
- Series
- Embedded Systems
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Security in Embedded Devices
Cathy Gebotys
Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.
- Provides must-have content for both security engineers and embedded systems designers;
- Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design;
- Covers security fundamentals, embedded security issues and crypto architecture;
- Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems.
โฆ Table of Contents
Front Matter....Pages i-xi
Where Security Began....Pages 1-12
Introduction to Secure Embedded Systems....Pages 13-27
The Key....Pages 29-48
Using Keys....Pages 49-73
Elliptic Curve Protocols....Pages 75-109
Symmetric Key Protocols Including Ciphers....Pages 111-142
Data Integrity and Message Authentication....Pages 143-161
Side Channel Attacks on the Embedded System....Pages 163-222
Countermeasures....Pages 223-261
Reliable Testable Secure Systems....Pages 263-289
Summary, Standards, and Ongoing Efforts....Pages 291-294
Back Matter....Pages 295-297
โฆ Subjects
Circuits and Systems; Computer-Aided Engineering (CAD, CAE) and Design; Communications Engineering, Networks; Systems and Data Security
๐ SIMILAR VOLUMES
This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book pro
Whereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects o