Sie sind auf Seite 1von 16

GUIDE: PRESENTED BY

Mr. G.VIJAY KIRAN M tech,Ph.D B.PADMAVATHI


16X91A0403
COORDINATOR: DEPARTMENT OF ECE
Mr. C.LAXMAN SUDHEER M tech SSN ENGINEERING COLLEGE

HOD:
Mr. D.JAYANAIDU SIR ME
Contents:
 Embedded system
 Network security
 Block diagram
 Hacking
 Security threats of embedded systems
 Challenges in security of embedded systems
 Side-channel attacks
 Side-channel emissions
 Basic security rules
 Applications
 Advantages
 Future scope
 Conclusion
Security threats of embedded systems
 Cryptography making the device less secure.
Programming error in the software is also big cause of
the security threat.
 Embedded system perform task that are time limited,
and any minute delay can cause lot of disruption and
loss of details.
 Some embedded system are produced to perform task
in critical environment i.e. high temperature,
humidity and even radiation to meet their
requirement.
Challenges in security of
embedded systems
 Security of embedded systems will only be ensured by
implementing security at both hardware and software
level. to implement security policies in these system,
have its own challenges. Some of the challenges are as
fallows
 Irregular software update:
 Attack reproductivity :
 Rules and regulations:
Side-channel attacks
 Classic cryptography views the secure problems with
mathematical abstractions.
 Recently , many of the security protocols have been
attacked through physical attacks.
 Modern cryptography is based on Kerckhoffs’s->
assumption all of the data required to operate a chip is
entirely hidden in the key.
Side-channel emissions
 Power consumption:
Logic circuits typically consume differing amounts of power
based on their input data.
 Electro-magnetic:
EM emissions , particularly via near-field inductive and
capacitive coupling, can also modulate the signals on the die.
 Timing and delay:
timing attacks exploit data dependent
Differences in calculation time in cryptography algorithms.
 Acoustic:
the acoustic emission are the result of the piezoelectric
properties of ceramic capacitors.
Basic security rules
 A complete product life cycle analysis need to be
performed and life cycle is divided into four stages.
 Possible entry paths for attacks into the system need to
be defined and described and kept to min value.
 A risk matrix need to be built.
 Hardware support layer.
 Secure default configuration: secure mode, hyperviser
mode and application mode.
 Design and test for security.

Application
 Home appliances
 Secure tele communication
 Instrumentation
 Automobile
 Aerospace
Advantages
 Secure and safe information.
 Protection from ethical hacking.
 Very economical.
Conclusion
 Security functions should be built in and defend
against threats within the environment.
 It is important to understand CPI and what is done to
protect it.
 Host systems must maintain ultimate control over
security algorithms to protect the data and prevent IP
theft
THANK YOU
ANY QUERIES?

Das könnte Ihnen auch gefallen