Security in Embedded Devices:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boston, MA
Springer US
2010
|
Ausgabe: | 1 |
Schriftenreihe: | Embedded Systems
|
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-1-4419-1530-6 https://doi.org/10.1007/978-1-4419-1530-6 https://doi.org/10.1007/978-1-4419-1530-6 https://doi.org/10.1007/978-1-4419-1530-6 https://doi.org/10.1007/978-1-4419-1530-6 |
Beschreibung: | Security in Embedded Devices Cathy Gebotys Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites. Provides must-have content for both security engineers and embedded systems designers; Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design; Covers security fundamentals, embedded security issues and crypto architecture; Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems |
Umfang: | 1 Online-Ressource |
ISBN: | 9781441915306 |
DOI: | 10.1007/978-1-4419-1530-6 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV041889588 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 140603s2010 xx o|||| 00||| eng d | ||
020 | |a 9781441915306 |c Online |9 978-1-4419-1530-6 | ||
024 | 7 | |a 10.1007/978-1-4419-1530-6 |2 doi | |
035 | |a (OCoLC)881666854 | ||
035 | |a (DE-599)BVBBV041889588 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-898 |a DE-573 |a DE-92 |a DE-83 | ||
082 | 0 | |a 621.3815 |2 23 | |
084 | |a ST 153 |0 (DE-625)143597: |2 rvk | ||
100 | 1 | |a Gebotys, Catherine H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security in Embedded Devices |c by Catherine H. Gebotys |
250 | |a 1 | ||
264 | 1 | |a Boston, MA |b Springer US |c 2010 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Embedded Systems | |
500 | |a Security in Embedded Devices Cathy Gebotys Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites. Provides must-have content for both security engineers and embedded systems designers; Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design; Covers security fundamentals, embedded security issues and crypto architecture; Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems | ||
505 | 0 | |a Where Security Began -- to Secure Embedded Systems -- The Key -- Using Keys -- Elliptic Curve Protocols -- Symmetric Key Protocols Including Ciphers -- Data Integrity and Message Authentication -- Side Channel Attacks on the Embedded System -- Countermeasures -- Reliable Testable Secure Systems -- Summary, Standards, and Ongoing Efforts | |
650 | 4 | |a Engineering | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer aided design | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Systems engineering | |
650 | 4 | |a Circuits and Systems | |
650 | 4 | |a Computer-Aided Engineering (CAD, CAE) and Design | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 0 | 7 | |a Eingebettetes System |0 (DE-588)4396978-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4419-1529-0 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4419-1530-6 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027333541 | |
966 | e | |u https://doi.org/10.1007/978-1-4419-1530-6 |l DE-634 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4419-1530-6 |l DE-573 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4419-1530-6 |l DE-92 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4419-1530-6 |l DE-898 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818979284770881536 |
---|---|
any_adam_object | |
author | Gebotys, Catherine H. |
author_facet | Gebotys, Catherine H. |
author_role | aut |
author_sort | Gebotys, Catherine H. |
author_variant | c h g ch chg |
building | Verbundindex |
bvnumber | BV041889588 |
classification_rvk | ST 153 |
collection | ZDB-2-ENG |
contents | Where Security Began -- to Secure Embedded Systems -- The Key -- Using Keys -- Elliptic Curve Protocols -- Symmetric Key Protocols Including Ciphers -- Data Integrity and Message Authentication -- Side Channel Attacks on the Embedded System -- Countermeasures -- Reliable Testable Secure Systems -- Summary, Standards, and Ongoing Efforts |
ctrlnum | (OCoLC)881666854 (DE-599)BVBBV041889588 |
dewey-full | 621.3815 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.3815 |
dewey-search | 621.3815 |
dewey-sort | 3621.3815 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-1-4419-1530-6 |
edition | 1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04215nam a2200637zc 4500</leader><controlfield tag="001">BV041889588</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140603s2010 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441915306</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4419-1530-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4419-1530-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881666854</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041889588</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.3815</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 153</subfield><subfield code="0">(DE-625)143597:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gebotys, Catherine H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in Embedded Devices</subfield><subfield code="c">by Catherine H. Gebotys</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Embedded Systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Security in Embedded Devices Cathy Gebotys Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites. Provides must-have content for both security engineers and embedded systems designers; Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design; Covers security fundamentals, embedded security issues and crypto architecture; Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Where Security Began -- to Secure Embedded Systems -- The Key -- Using Keys -- Elliptic Curve Protocols -- Symmetric Key Protocols Including Ciphers -- Data Integrity and Message Authentication -- Side Channel Attacks on the Embedded System -- Countermeasures -- Reliable Testable Secure Systems -- Summary, Standards, and Ongoing Efforts</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer aided design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Circuits and Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer-Aided Engineering (CAD, CAE) and Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4419-1529-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4419-1530-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027333541</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-1530-6</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-1530-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-1530-6</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-1530-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041889588 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T16:57:05Z |
institution | BVB |
isbn | 9781441915306 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027333541 |
oclc_num | 881666854 |
open_access_boolean | |
owner | DE-634 DE-898 DE-BY-UBR DE-573 DE-92 DE-83 |
owner_facet | DE-634 DE-898 DE-BY-UBR DE-573 DE-92 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer US |
record_format | marc |
series2 | Embedded Systems |
spelling | Gebotys, Catherine H. Verfasser aut Security in Embedded Devices by Catherine H. Gebotys 1 Boston, MA Springer US 2010 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Embedded Systems Security in Embedded Devices Cathy Gebotys Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. Now they must also deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites. Provides must-have content for both security engineers and embedded systems designers; Describes numerous case studies, including contactless smartcards, PDA security, and satellite security, illustrating various aspects of secure, embedded design; Covers security fundamentals, embedded security issues and crypto architecture; Shows readers how to attack an embedded system and how to embed countermeasures to resist attack--readers are shown that understanding attacks is crucial to implementing security in embedded systems Where Security Began -- to Secure Embedded Systems -- The Key -- Using Keys -- Elliptic Curve Protocols -- Symmetric Key Protocols Including Ciphers -- Data Integrity and Message Authentication -- Side Channel Attacks on the Embedded System -- Countermeasures -- Reliable Testable Secure Systems -- Summary, Standards, and Ongoing Efforts Engineering Data protection Computer aided design Telecommunication Systems engineering Circuits and Systems Computer-Aided Engineering (CAD, CAE) and Design Communications Engineering, Networks Systems and Data Security Ingenieurwissenschaften Eingebettetes System (DE-588)4396978-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Eingebettetes System (DE-588)4396978-1 s Computersicherheit (DE-588)4274324-2 s Kryptologie (DE-588)4033329-2 s 1\p DE-604 Erscheint auch als Druckausgabe 978-1-4419-1529-0 https://doi.org/10.1007/978-1-4419-1530-6 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Gebotys, Catherine H. Security in Embedded Devices Where Security Began -- to Secure Embedded Systems -- The Key -- Using Keys -- Elliptic Curve Protocols -- Symmetric Key Protocols Including Ciphers -- Data Integrity and Message Authentication -- Side Channel Attacks on the Embedded System -- Countermeasures -- Reliable Testable Secure Systems -- Summary, Standards, and Ongoing Efforts Engineering Data protection Computer aided design Telecommunication Systems engineering Circuits and Systems Computer-Aided Engineering (CAD, CAE) and Design Communications Engineering, Networks Systems and Data Security Ingenieurwissenschaften Eingebettetes System (DE-588)4396978-1 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4396978-1 (DE-588)4274324-2 (DE-588)4033329-2 |
title | Security in Embedded Devices |
title_auth | Security in Embedded Devices |
title_exact_search | Security in Embedded Devices |
title_full | Security in Embedded Devices by Catherine H. Gebotys |
title_fullStr | Security in Embedded Devices by Catherine H. Gebotys |
title_full_unstemmed | Security in Embedded Devices by Catherine H. Gebotys |
title_short | Security in Embedded Devices |
title_sort | security in embedded devices |
topic | Engineering Data protection Computer aided design Telecommunication Systems engineering Circuits and Systems Computer-Aided Engineering (CAD, CAE) and Design Communications Engineering, Networks Systems and Data Security Ingenieurwissenschaften Eingebettetes System (DE-588)4396978-1 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Engineering Data protection Computer aided design Telecommunication Systems engineering Circuits and Systems Computer-Aided Engineering (CAD, CAE) and Design Communications Engineering, Networks Systems and Data Security Ingenieurwissenschaften Eingebettetes System Computersicherheit Kryptologie |
url | https://doi.org/10.1007/978-1-4419-1530-6 |
work_keys_str_mv | AT gebotyscatherineh securityinembeddeddevices |