Embedded systems security : practical methods for safe and secure software and systems development /
Kleidermacher, David.
Embedded systems security : practical methods for safe and secure software and systems development / David Kleidermacher, Mike Kleidermacher. - First Edition. - xx, 396 pages. : illustrations ; 24 cm.
Includes bibliographical references and index.
Chapter 1. Introduction to Embedded Systems Security
1.1 What is Security?
1.2 What is an Embedded System?
1.3 Embedded Security Trends
1.4 Security Policies
1.5 Security Threats
1.6 Wrap-up
1.7 Key Points
1.8 Bibliography and Notes
Chapter 2. Systems Software Considerations
2.1 The Role of the Operating System
2.2 Multiple Independent Levels of Security
2.3 Microkernel versus Monolith
2.4 Core Embedded Operating System Security Requirements
2.5 Access Control and Capabilities
2.6 Hypervisors and System Virtualization
2.7 I/O Virtualization
2.8 Remote Management
2.9 Assuring Integrity of the TCB
2.10 Key Points
2.11 Bibliography and Notes
Chapter 3. Secure Embedded Software Development
3.1 Introduction to PHASE—Principles of High-Assurance Software Engineering
3.2 Minimal Implementation
3.3 Component Architecture
3.4 Least Privilege
3.5 Secure Development Process
3.6 Independent Expert Validation
3.7 Case Study: HAWS—High-Assurance Web Server
3.8 Model-Driven Design
3.9 Key Points
3.10 Bibliography and Notes
Chapter 4. Embedded Cryptography
4.1 Introduction
4.2 U.S. Government Cryptographic Guidance
4.3 The One-Time Pad
4.4 Cryptographic Modes
4.5 Block Ciphers
4.6 Authenticated Encryption
4.7 Public Key Cryptography
4.8 Key Agreement
4.9 Public Key Authentication
4.10 Elliptic Curve Cryptography
4.11 Cryptographic Hashes
4.12 Message Authentication Codes
4.13 Random Number Generation
4.14 Key Management for Embedded Systems
4.15 Cryptographic Certifications
4.16 Key Points
4.14 Bibliography and Notes
Chapter 5. Data Protection Protocols for Embedded Systems
5.1 Introduction
5.2 Data-in-Motion Protocols
5.3 Data-at-Rest Protocols
5.4 Key Points
5.5 Bibliography and Notes
Chapter 6. Emerging Applications
6.1 Embedded Network Transactions
6.2 Automotive Security
6.3 Secure Android
6.4 Next-Generation Software-Defined Radio
6.5 Key Points
6.6 Bibliography and Notes
9780123868862 (pbk.) 0123868866 (pbk.)
2012931463
Computer software--Development.
Computer security.
Electronic books.
QA76.76.D47 / K5634 2012
005.8 / K.D.E
Embedded systems security : practical methods for safe and secure software and systems development / David Kleidermacher, Mike Kleidermacher. - First Edition. - xx, 396 pages. : illustrations ; 24 cm.
Includes bibliographical references and index.
Chapter 1. Introduction to Embedded Systems Security
1.1 What is Security?
1.2 What is an Embedded System?
1.3 Embedded Security Trends
1.4 Security Policies
1.5 Security Threats
1.6 Wrap-up
1.7 Key Points
1.8 Bibliography and Notes
Chapter 2. Systems Software Considerations
2.1 The Role of the Operating System
2.2 Multiple Independent Levels of Security
2.3 Microkernel versus Monolith
2.4 Core Embedded Operating System Security Requirements
2.5 Access Control and Capabilities
2.6 Hypervisors and System Virtualization
2.7 I/O Virtualization
2.8 Remote Management
2.9 Assuring Integrity of the TCB
2.10 Key Points
2.11 Bibliography and Notes
Chapter 3. Secure Embedded Software Development
3.1 Introduction to PHASE—Principles of High-Assurance Software Engineering
3.2 Minimal Implementation
3.3 Component Architecture
3.4 Least Privilege
3.5 Secure Development Process
3.6 Independent Expert Validation
3.7 Case Study: HAWS—High-Assurance Web Server
3.8 Model-Driven Design
3.9 Key Points
3.10 Bibliography and Notes
Chapter 4. Embedded Cryptography
4.1 Introduction
4.2 U.S. Government Cryptographic Guidance
4.3 The One-Time Pad
4.4 Cryptographic Modes
4.5 Block Ciphers
4.6 Authenticated Encryption
4.7 Public Key Cryptography
4.8 Key Agreement
4.9 Public Key Authentication
4.10 Elliptic Curve Cryptography
4.11 Cryptographic Hashes
4.12 Message Authentication Codes
4.13 Random Number Generation
4.14 Key Management for Embedded Systems
4.15 Cryptographic Certifications
4.16 Key Points
4.14 Bibliography and Notes
Chapter 5. Data Protection Protocols for Embedded Systems
5.1 Introduction
5.2 Data-in-Motion Protocols
5.3 Data-at-Rest Protocols
5.4 Key Points
5.5 Bibliography and Notes
Chapter 6. Emerging Applications
6.1 Embedded Network Transactions
6.2 Automotive Security
6.3 Secure Android
6.4 Next-Generation Software-Defined Radio
6.5 Key Points
6.6 Bibliography and Notes
9780123868862 (pbk.) 0123868866 (pbk.)
2012931463
Computer software--Development.
Computer security.
Electronic books.
QA76.76.D47 / K5634 2012
005.8 / K.D.E