This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
November-December 2007 (vol. 24 no. 6)
pp. 518-520
Patrick Schaumont, Virginia Tech
Anand Raghunathan, NEC Laboratories America
Security and trust have become important considerations in the design of virtually all modern embedded systems. The requirements of secure and trusted design are unique: Secure design emphasizes information leakage (or prevention thereof) and dependable behavior. Even strong cryptographic algorithms are of little use if the underlying processor can be tricked into releasing cryptographic keys. This leads to unique design techniques such as design and implementation of boundaries for logical and physical protection, design of protected storage and secure-computing primitives, runtime measurement and reporting of security properties, and implementation of side-channel-resistant hardware and software. Eventually, the embedded-system designer must cope with security as yet another requirement in addition to existing functional requirements, performance, power, and cost. This special issue presents six articles that address various critical aspects of secure embedded-systems design.
Index Terms:
security, trust, embedded systems, design
Citation:
Patrick Schaumont, Anand Raghunathan, "Guest Editors' Introduction: Security and Trust in Embedded-Systems Design," IEEE Design & Test of Computers, vol. 24, no. 6, pp. 518-520, Nov.-Dec. 2007, doi:10.1109/MDT.2007.188
Usage of this product signifies your acceptance of the Terms of Use.