Secure Embedded Systems: Digging for the Roots of Trust
Many embedded designs absolutely have to work right. A malfunction could do unacceptable harm to persons or property. Until recently, this requirement has been addressed through careful design and hardware reliability: if the software and the logic are right and there are no hardware failures, the system will work.
But today we live in the age of undeclared cyber warfare. If your system must work, you must assume that everyone from bored hackers to criminal gangs to lavishly funded government laboratories will attack it. In order to defend your system, you must determine what—and, eventually, whom—you can trust. This is not an easy, or, some argue, even an achievable quest. But undertake it you must.
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |
|
Altera Hot IP
Related Articles
- Secure Virtualization as an Enabler of Trusted Execution Environments in Embedded Computing
- Securing the IoT: Part 2 - Secure boot as root of trust
- Building more secure embedded software with code coverage analysis
- Anti tamper real time clock (RTC) - make your embedded system secure
- Using cryptography to secure embedded device authentication profiles: Part 2
New Articles
- Nexus: A Lightweight and Scalable Multi-Agent Framework for Complex Tasks Automation
- How the Ability to Manage Register Specifications Helps You Create More Competitive Products
- EAVS - Electra IC Advanced Verification Suite for RISC-V Cores
- Why RISC-V is a viable option for safety-critical applications
- Dimensioning in 3D space: Object Volumetric Measurement by Leveraging Depth Camera-based Reconstruction on NVIDIA Edge devices
Most Popular
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- PCIe error logging and handling on a typical SoC
- Enhancing VLSI Design Efficiency: Tackling Congestion and Shorts with Practical Approaches and PnR Tool (ICC2)
- Synthesis Methodology & Netlist Qualification