Latest from Embedded

Dreamstime_christophermyers_572927691
dreamstime_christophermyers_572927691
Dreamstime_asliyuce_2829564261
dreamstime_asliyuce_2829564261
ID 145199558 © Alexey Novikov | Dreamstime.com
digital_identity_dreamstime_l_145199558
ID 32216338 © Smontgom65 | Dreamstime.com
maker_dreamstime_l_32216338
By Stelo.xyz, Pttn, or Thomas Nguyen, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=47684767
1. The Intel 4004 used MOS silicon gate technology (SGT). and originally targeted electronic calculator applications.

Backdoors are for Houses—Not Security (.PDF Download)

Sept. 10, 2019
Backdoors are for Houses—Not Security (.PDF Download)

Security has finally found a place in embedded applications as the Internet of Things (IoT) continues to rise in importance. Hacked systems have been the bane of PCs and smartphones, even as developers try to deliver more secure systems. It’s hard enough to prevent attacks like ransomware without having to worry about backdoors.

These days, IoT solutions are hyping end-to-end security. This typically includes secure attestation, authentication, secure communication, and even secure updates. A lot of security layers and protocols are involved, and they’re designed to secure a system and possibly isolate any breaches. Knowing that a breach has occurred is useful information by itself when considering the overall security of a system.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!