Securing Embedded Systems

Embedded systems come in a wide range of flavors and can be surprisingly complicated and difficult to secure. I’m going to look at three types of basic designs, describe why they’re difficult to secure, and what you can do to secure these systems.

One of the reasons we have so many different kinds of embedded system designs is the wide range of embedded systems people use. We have devices that are considered embedded systems running on hardware ranging from small PIC processors to ARM systems to fully featured systems-on-a-chip, not that different from what we see in cell phones. The scale and feature sets of these chips directly impact the complexity of the controlling software and leads us to a fairly straightforward taxonomy of possible software designs.

Read full news article on Dzone

 


Date:

Categorie(s):