The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November-December (2007 vol.24)
pp: 518-520
Patrick Schaumont , Virginia Tech
ABSTRACT
Security and trust have become important considerations in the design of virtually all modern embedded systems. The requirements of secure and trusted design are unique: Secure design emphasizes information leakage (or prevention thereof) and dependable behavior. Even strong cryptographic algorithms are of little use if the underlying processor can be tricked into releasing cryptographic keys. This leads to unique design techniques such as design and implementation of boundaries for logical and physical protection, design of protected storage and secure-computing primitives, runtime measurement and reporting of security properties, and implementation of side-channel-resistant hardware and software. Eventually, the embedded-system designer must cope with security as yet another requirement in addition to existing functional requirements, performance, power, and cost. This special issue presents six articles that address various critical aspects of secure embedded-systems design.
INDEX TERMS
security, trust, embedded systems, design
CITATION
Patrick Schaumont, "Guest Editors' Introduction: Security and Trust in Embedded-Systems Design", IEEE Design & Test of Computers, vol.24, no. 6, pp. 518-520, November-December 2007, doi:10.1109/MDT.2007.188
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool