Embedded Systems Security

Embedded Systems Security

Muhammad Farooq-i-Azam, Muhammad Naeem Ayyaz
DOI: 10.4018/978-1-60960-851-4.ch010
(Individual Chapters)
No Current Special Offers


Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks. However, during the previous few years, it has been demonstrated that novel attacks against the hardware and embedded systems can also be mounted. Not only viruses, but worms and Trojan horses have been developed for them, and they have also been demonstrated to be effective. Whereas a lot of research has already been done in the area of security of general purpose computers and software applications, hardware and embedded systems security is a relatively new and emerging area of research. This chapter provides details of various types of existing attacks against hardware devices and embedded systems, analyzes existing design methodologies for their vulnerability to new types of attacks, and along the way describes solutions and countermeasures against them for the design and development of secure systems.
Chapter Preview


Embedded systems security is a new and emerging area of research. It is meeting point of many disciplines such as electronics, logic design, embedded systems, signal processing and cryptography. It is closely related to the area of information and software systems security because software is an integral component of any embedded system.

First microprocessor was developed around 1971 and later innovations in this field resulted in the development of computer systems and embedded devices. Software is an integral component of the both. In particular, every desktop computer carries a critical piece of software called the operating system. It manages the hardware resources and makes it possible for an end user to operate the computer. Other software applications in a computer run on top of the operating system.

Complete Chapter List

Search this Book: