Latest from Embedded

William Wong/Endeavor Business Media
promo__vita_93_qmc__william_wong
ID 316508515 © Alena Butusava - Dreamstime.com
Brainchip Platform Uses Spiking Neural Networks for Low Power Operations
Dreamstime_Eugenesergeev_215838205
dreamstime_eugenesergeev_215838205
76795646 © Cybrain | Dreamstime.com
promo_cybrain_dreamstime_xxl_76795646
ID 23149447 © Joe Sohm - ID 160236318 © Tea - Dreamstime.com
id_23149447__joe_sohm__id_160236318__tea__dreamsti

Backdoors are for Houses—Not Security (.PDF Download)

Sept. 10, 2019
Backdoors are for Houses—Not Security (.PDF Download)

Security has finally found a place in embedded applications as the Internet of Things (IoT) continues to rise in importance. Hacked systems have been the bane of PCs and smartphones, even as developers try to deliver more secure systems. It’s hard enough to prevent attacks like ransomware without having to worry about backdoors.

These days, IoT solutions are hyping end-to-end security. This typically includes secure attestation, authentication, secure communication, and even secure updates. A lot of security layers and protocols are involved, and they’re designed to secure a system and possibly isolate any breaches. Knowing that a breach has occurred is useful information by itself when considering the overall security of a system.