Embedded Systems -- A Security Paradigm for Pervasive Computing

The rapidly shrinking size of processor chips and memory, coupled with increasing speed and processing elements, has enabled widespread usage of embedded systems running software code, for the overall control and monitoring of larger systems. These embedded systems have proliferated in almost all the modern electronic equipment used in industries, home, automobiles, military battlefields, space or personal consumer electronic systems. The omnipresent and pervasive computing enabled by these embedded systems controlling/monitoring a wide array of complex networked or independent systems, need to be dependable and safe. With mass proliferation, the security of embedded systems presents a unique set of requirements and challenges. It is therefore important to study and assess the potential risks, threat vectors, potential adversaries/attackers and attack methodologies in order to effectively incorporate security in technology and processes right from the conceptual/design stages. The identification and analysis of the threats, vulnerabilities and study of risk mitigation methods, potential attackers and common attack methodologies is critical in implementing security measures in design, development, exploitation and final disposal phases of the embedded system.

[1]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[2]  Antonio Maña,et al.  A Security Modelling Framework for Systems of Embedded Components , 2011, 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering.

[3]  Saad Zafar,et al.  Integrating safety and security requirements into design of an embedded system , 2005, 12th Asia-Pacific Software Engineering Conference (APSEC'05).

[4]  Jaydip Sen,et al.  Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.

[5]  Joe Grand,et al.  Practical Secure Hardware Design for Embedded Systems , 2004 .

[6]  Patrick Schaumont,et al.  Design methods for Security and Trust , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.

[7]  Hamid Noori,et al.  Securing Embedded Processors against Power Analysis Based Side Channel Attacks Using Reconfigurable Architecture , 2011, 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing.

[8]  Jae Hee Lee,et al.  Assuring software security against buffer overflow attacks in embedded software development life cycle , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[9]  Sylvain Guilley,et al.  Embedded systems security: An evaluation methodology against Side Channel Attacks , 2011, Proceedings of the 2011 Conference on Design & Architectures for Signal & Image Processing (DASIP).

[10]  Ian Vince McLoughlin Secure Embedded Systems: The Threat of Reverse Engineering , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.

[11]  Christof Paar,et al.  Embedded security in a pervasive world , 2007, Inf. Secur. Tech. Rep..

[12]  Ramesh Karri,et al.  A Survey of Microarchitecture Support for Embedded Processor Security , 2012, 2012 IEEE Computer Society Annual Symposium on VLSI.

[13]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[14]  James A. McCoy An embedded system for safe, secure and reliable execution of high consequence software , 2000, Proceedings. Fifth IEEE International Symposium on High Assurance Systems Engineering (HASE 2000).