Beruflich Dokumente
Kultur Dokumente
HOD:
Mr. D.JAYANAIDU SIR ME
Contents:
Embedded system
Network security
Block diagram
Hacking
Security threats of embedded systems
Challenges in security of embedded systems
Side-channel attacks
Side-channel emissions
Basic security rules
Applications
Advantages
Future scope
Conclusion
Security threats of embedded systems
Cryptography making the device less secure.
Programming error in the software is also big cause of
the security threat.
Embedded system perform task that are time limited,
and any minute delay can cause lot of disruption and
loss of details.
Some embedded system are produced to perform task
in critical environment i.e. high temperature,
humidity and even radiation to meet their
requirement.
Challenges in security of
embedded systems
Security of embedded systems will only be ensured by
implementing security at both hardware and software
level. to implement security policies in these system,
have its own challenges. Some of the challenges are as
fallows
Irregular software update:
Attack reproductivity :
Rules and regulations:
Side-channel attacks
Classic cryptography views the secure problems with
mathematical abstractions.
Recently , many of the security protocols have been
attacked through physical attacks.
Modern cryptography is based on Kerckhoffs’s->
assumption all of the data required to operate a chip is
entirely hidden in the key.
Side-channel emissions
Power consumption:
Logic circuits typically consume differing amounts of power
based on their input data.
Electro-magnetic:
EM emissions , particularly via near-field inductive and
capacitive coupling, can also modulate the signals on the die.
Timing and delay:
timing attacks exploit data dependent
Differences in calculation time in cryptography algorithms.
Acoustic:
the acoustic emission are the result of the piezoelectric
properties of ceramic capacitors.
Basic security rules
A complete product life cycle analysis need to be
performed and life cycle is divided into four stages.
Possible entry paths for attacks into the system need to
be defined and described and kept to min value.
A risk matrix need to be built.
Hardware support layer.
Secure default configuration: secure mode, hyperviser
mode and application mode.
Design and test for security.
Application
Home appliances
Secure tele communication
Instrumentation
Automobile
Aerospace
Advantages
Secure and safe information.
Protection from ethical hacking.
Very economical.
Conclusion
Security functions should be built in and defend
against threats within the environment.
It is important to understand CPI and what is done to
protect it.
Host systems must maintain ultimate control over
security algorithms to protect the data and prevent IP
theft
THANK YOU
ANY QUERIES?