Practical Embedded Security -  Timothy Stapko

Practical Embedded Security (eBook)

Building Secure Resource-Constrained Systems
eBook Download: EPUB | PDF
2011 | 1. Auflage
284 Seiten
Elsevier Science (Verlag)
978-0-08-055131-9 (ISBN)
54,95 € inkl. MwSt
Systemvoraussetzungen
54,43 € inkl. MwSt
Systemvoraussetzungen
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance in their designs than ever before. This is particularly challenging due to embedded devices' inherent resource constraints such as limited power and memory. Therefore, traditional security solutions must be customized to fit their profile, and entirely new security concepts must be explored. However, there are few resources available to help engineers understand how to implement security measures within the unique embedded context. This new book from embedded security expert Timothy Stapko is the first to provide engineers with a comprehensive guide to this pivotal topic. From a brief review of basic security concepts, through clear explanations of complex issues such as choosing the best cryptographic algorithms for embedded utilization, the reader is provided with all the information needed to successfully produce safe, secure embedded devices.

.The ONLY book dedicated to a comprehensive coverage of embedded security!
.Covers both hardware and software-based embedded security solutions for preventing and dealing with attacks
.Application case studies support practical explanations of all key topics, including network protocols, wireless and cellular communications, languages (Java and C/++), compilers, web-based interfaces, cryptography, and an entire section on SSL
The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance in their designs than ever before. This is particularly challenging due to embedded devices' inherent resource constraints such as limited power and memory. Therefore, traditional security solutions must be customized to fit their profile, and entirely new security concepts must be explored. However, there are few resources available to help engineers understand how to implement security measures within the unique embedded context. This new book from embedded security expert Timothy Stapko is the first to provide engineers with a comprehensive guide to this pivotal topic. From a brief review of basic security concepts, through clear explanations of complex issues such as choosing the best cryptographic algorithms for embedded utilization, the reader is provided with all the information needed to successfully produce safe, secure embedded devices. The ONLY book dedicated to a comprehensive coverage of embedded security! Covers both hardware- and software-based embedded security solutions for preventing and dealing with attacks Application case studies support practical explanations of all key topics, including network protocols, wireless and cellular communications, languages (Java and C/++), compilers, web-based interfaces, cryptography, and an entire section on SSL

Front cover 1
Practical Embedded Security 4
Copyright page 5
Table of contents 6
Preface 10
CHAPTER 1: Computer Security Introduction and Review 20
What Is Security? 21
What Can We Do? 21
Access Control and the Origins of Computer Security Theory 22
Security Policies 23
Cryptography 27
Data Integrity and Authentication 32
Wrap-Up 40
Recommended Reading 40
CHAPTER 2: Network Communications Protocols and Built-in Security 42
Low-Level Communications 43
Transport and Internet Layer Protocols 51
Other Network Protocols 57
Wrap-Up: Network Communications 67
CHAPTER 3: Security Protocols and Algorithms 68
Protocol Madness 69
Standardizing Security—A Brief History 70
Standardized Security in Practice 72
Cryptography and Protocols 79
Other Security Protocols 81
CHAPTER 4: The Secure Sockets Layer 86
SSL History 86
Pesky PKI 87
PKI Alternatives 89
SSL Under the Hood 91
The SSL Session 98
SSL in Practice 100
Wrap-Up 101
CHAPTER 5: Embedded Security 102
Networked Embedded Systems and Resource Constraints 103
Embedded Security Design 106
The KISS Principle 110
Modularity Is Key 114
Pick and Pull 128
Justification 132
Wrap-Up 133
CHAPTER 6: Wireless 134
Wireless Technologies 134
Bluetooth 141
ZigBee 142
Wireless Technologies and the Future 145
Wrap-Up 146
CHAPTER 7: Application-Layer and Client/Server Protocols 148
Introduction 148
The World Wide Web 149
Web-Based Interfaces 150
Server-Side HTTP Web Interfaces 153
HTTP Client Web Interfaces 156
Combination Client/Server HTTP Applications 157
Console Applications 157
File Transfer Protocol 159
Email, DNS, DHCP, and SNMP 164
Wrap-Up 166
CHAPTER 8: Choosing and Optimizing Cryptographic Algorithms for Resource-Constrained Systems 168
Do We Need Cryptography? 169
Hashing—Low Security, High Performance 171
To Optimize or Not to Optimize · · · 177
Choosing Cryptographic Algorithms 184
Tailoring Security for Your Application 189
Wrap-Up 190
CHAPTER 9: Hardware-Based Security 192
High Performance in Silicon 192
Wrap-Up: Security and Hardware 197
CHAPTER 10: Conclusion—Miscellaneous Security Issues and the Future of Embedded Applications Security 198
Programming Languages and Security 198
Dealing with Attacks 199
The Future of Security 201
Wrap-Up 203
CHAPTER 11: PIC Case Study 206
Microchip PIC with Ethernet Controller 206
PIC Example Application—Secure LED Blinking 208
CHAPTER 12: Rabbit Case Study 226
Rabbit 4000 CPU with Dynamic C 226
The History of Rabbit 226
Software on the Rabbit 227
Rabbit Case Study—Internet Enabled Vending Machine 229
Putting It All Together 238
The PC Side 242
Wrap-Up: A Secure Rabbit 242
APPENDIX A: Source Listings 244
PIC Example Source Code (Main Program) 244
Index 298

Erscheint lt. Verlag 1.4.2011
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
ISBN-10 0-08-055131-9 / 0080551319
ISBN-13 978-0-08-055131-9 / 9780080551319
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)
Größe: 10,3 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99