000 03126cam a22003617i 4500
999 _c8228
_d8228
001 17130971
005 20210427112119.0
008 120123s2012 ne a b 001 0 eng d
010 _a 2012931463
020 _a9780123868862 (pbk.)
020 _a0123868866 (pbk.)
040 _aBTCTA
_cBTCTA
_dUKMGB
_dYDXCP
_dBWX
_dYNK
_dCUV
_dCDX
_dNLE
_dDLC
_erda
050 0 0 _aQA76.76.D47
_bK5634 2012
082 0 4 _a005.8
_223
_bK.D.E
100 1 _aKleidermacher, David.
245 1 0 _aEmbedded systems security :
_bpractical methods for safe and secure software and systems development /
_cDavid Kleidermacher, Mike Kleidermacher.
250 _aFirst Edition.
264 1 _aAmsterdam :
_bElsevier,
_c2012.
300 _axx, 396 pages. :
_billustrations ;
_c24 cm.
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
504 _aIncludes bibliographical references and index.
505 0 _aChapter 1. Introduction to Embedded Systems Security 1.1 What is Security? 1.2 What is an Embedded System? 1.3 Embedded Security Trends 1.4 Security Policies 1.5 Security Threats 1.6 Wrap-up 1.7 Key Points 1.8 Bibliography and Notes Chapter 2. Systems Software Considerations 2.1 The Role of the Operating System 2.2 Multiple Independent Levels of Security 2.3 Microkernel versus Monolith 2.4 Core Embedded Operating System Security Requirements 2.5 Access Control and Capabilities 2.6 Hypervisors and System Virtualization 2.7 I/O Virtualization 2.8 Remote Management 2.9 Assuring Integrity of the TCB 2.10 Key Points 2.11 Bibliography and Notes
505 0 _aChapter 3. Secure Embedded Software Development 3.1 Introduction to PHASE—Principles of High-Assurance Software Engineering 3.2 Minimal Implementation 3.3 Component Architecture 3.4 Least Privilege 3.5 Secure Development Process 3.6 Independent Expert Validation 3.7 Case Study: HAWS—High-Assurance Web Server 3.8 Model-Driven Design 3.9 Key Points 3.10 Bibliography and Notes Chapter 4. Embedded Cryptography 4.1 Introduction 4.2 U.S. Government Cryptographic Guidance 4.3 The One-Time Pad 4.4 Cryptographic Modes 4.5 Block Ciphers 4.6 Authenticated Encryption 4.7 Public Key Cryptography 4.8 Key Agreement 4.9 Public Key Authentication 4.10 Elliptic Curve Cryptography 4.11 Cryptographic Hashes 4.12 Message Authentication Codes 4.13 Random Number Generation 4.14 Key Management for Embedded Systems 4.15 Cryptographic Certifications 4.16 Key Points 4.14 Bibliography and Notes Chapter 5. Data Protection Protocols for Embedded Systems 5.1 Introduction 5.2 Data-in-Motion Protocols 5.3 Data-at-Rest Protocols 5.4 Key Points 5.5 Bibliography and Notes
505 0 _aChapter 6. Emerging Applications 6.1 Embedded Network Transactions 6.2 Automotive Security 6.3 Secure Android 6.4 Next-Generation Software-Defined Radio 6.5 Key Points 6.6 Bibliography and Notes
650 0 _aComputer software
_xDevelopment.
650 0 _aComputer security.
655 4 _aElectronic books.
700 1 _aKleidermacher, Mike.
942 _cBK
_2ddc