Limit search to available items
Book Cover
E-book

Title Trusted computing for embedded systems / Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos, editors
Published Cham : Springer, [2014]
©2015

Copies

Description 1 online resource (xxvi, 299 pages) : illustrations (some color)
Contents Foreword; Preface; Contents; Contributors; Acronyms; Part I Introduction; 1 Programming Interfaces for the TPM; 1.1 Introduction; 1.2 Trusted Computing in the Java Environment; 1.2.1 Java for Embedded Systems; 1.3 TCG Software Architecture; 1.3.1 The TCG Software Stack; 1.3.1.1 TSS in Embedded Systems; 1.3.2 Review of Existing Java Libraries; 1.3.2.1 Trusted Computing for the Java Platform and jTSS; 1.3.2.2 TPM/J; 1.3.2.3 TPM4JAVA; 1.3.3 Other Proposed Higher Level Interfaces; 1.3.4 Findings; 1.4 API Design; 1.4.1 Goals for a Novel API; 1.4.2 Expected Developer Knowledge
1.4.3 API Scope Considerations1.5 Outline of the API; 1.6 Experience and Outlook; 1.6.1 Third Party Implementation and Teaching Experience; 1.6.2 Application in Embedded Systems; 1.6.2.1 Benchmark Platforms; 1.6.2.2 Benchmarks and Results; 1.6.2.3 Performance Discussion; 1.6.3 Compatibility with Next Generation TPMs; References; Part II Applications-Use Cases; 2 ARM℗ʼ TrustZone℗ʼ; 2.1 TrustZone Overview; 2.2 Protection Target; 2.3 Architecture; 2.3.1 The NS Bit; 2.3.2 The Monitor, World Switching and CP-15; 2.3.3 Interrupt Handling; 2.3.4 Fabric Support; 2.3.4.1 Cache Controller
2.3.4.2 Generic Interrupt Controller (GIC)2.3.4.3 Address Space Controller; 2.4 Pitfalls; 2.4.1 Leaving Debug Features Enabled; 2.4.2 Incorrect Management of the Memory System; 2.4.3 Poor Handling of Firmware or Software Verification; 2.4.4 Poorly Designed Application Interfaces; 2.4.5 Insecure Use of Shared Buffers; 2.4.6 Incorrectly Configured Bus Peripheralsand Bad Drivers; 2.5 Standardized Software Environment; 2.5.1 TrustZone Software; 2.5.2 TEE; 2.5.3 Role in Secure Boot; References; 3 Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges; 3.1 Introduction
3.2 The Smart Metering Scenario3.2.1 Architectural Reference: Actors and Services; 3.3 Security and Privacy Challenges; 3.3.1 Security Engineering Requirements; 3.4 System Services; 3.5 Standardization Activities and Related works; References; 4 Authentication and Mutual Authentication; 4.1 Basics of Authentication; 4.1.1 What-You-Know; 4.1.2 What-You-Have; 4.1.2.1 Public Key Cryptography; 4.1.2.2 OTP; 4.1.3 What-You-Are; 4.1.3.1 Biometry; 4.1.3.2 Behavior; 4.1.3.3 Physical Unclonable Functions (PUFs); 4.1.3.4 Device Fingerprinting; 4.1.4 Credential Delivery; 4.1.4.1 Local; 4.1.4.2 In-Band
4.1.4.3 Out-of-Band4.1.5 Method Strength; 4.2 Mutual Authentication; 5 Low Power Wireless Sensor Networks: Secure Applications and Remote Distribution of FW Updates with Key Management on WSN; 5.1 Introduction; 5.2 Secure OTAP; 5.2.1 Introduction; 5.2.2 Actors; 5.2.3 Protocol Messages; 5.2.3.1 Firmware; 5.2.3.2 Control Information; 5.2.4 OTAP Information Dissemination; 5.2.4.1 Serving Firmware Version from OTAP Server to Gateway; 5.2.4.2 Disseminating Program Image into WSN; 5.2.4.3 Rebooting with New Firmware Version; 5.3 OTAP Partial Firmware Update; 5.3.1 Introduction
Summary This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devi
Analysis engineering
circuits
procesarchitectuur
process architecture
elektronica
electronics
instrumentatie
instrumentation
gegevensbeheer
data management
Engineering (General)
Techniek (algemeen)
Bibliography Includes bibliographical references and index
Notes Online resource; title from PDF title page (SpringerLink, viewed December 23, 2014)
Subject Embedded computer systems -- Security measures
COMPUTERS -- General.
COMPUTERS -- Security -- General.
Computer science
Data protection
Electronics
Engineering
Systems engineering
Form Electronic book
Author Candaele, Bernard, editor
Sous, Dimitrios, editor
Anagnostopoulos, Iraklis, editor
ISBN 9783319094205
3319094203
331909419X
9783319094199