Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security in embedded systems: design challenges
Ravi S., Raghunathan A., Kocher P., Hattangady S. ACM Transactions on Embedded Computing Systems3 (3):461-491,2004.Type:Article
Date Reviewed: Nov 17 2004

Ravi et al. present security-related challenges (“gaps”), unique to embedded system design (namely, security processing, power, tamper resistance, and assurance gaps), with associated descriptions of recent security advances, and opportunities for more research. After a brief introduction, discussing the importance and uniqueness of the embedded security challenges, an enumeration of security requirements, concepts, and design challenges are given.

The heart of this paper is the section on security processing requirements and architecture, starting with a popular secure sockets layer (SSL) protocol, and processing workload example. The gap associated with state-of-the-art processing is presented with respect to secure processing architecture and battery management examples. The next “tamper resistance and assurance gap” presents an overview of both logical and physical attacks on an embedded system, covering topics such as fault induction, and timing and power analysis. Finally, two case studies are presented: the OMAP 1610 processor, addressing the security processing gap for wireless handsets, and the ARM TrustZone, for thwarting software attacks.

This paper provides a good overview of some of the security issues for commercial embedded systems. The figures--covering processing requirements for SSL, energy consumption data for ciphers, and evolution of security protocols--were particularly useful in visualizing secure embedded processing trends. There are secure embedded challenges for defense systems--namely, MILS, covert channels, data separation, and so on--that would make a good complement to this paper.

Reviewer:  Jeff Smith Review #: CR130439 (0504-0442)
Bookmark and Share
  Reviewer Selected
 
 
System Architectures (C.0 ... )
 
 
Real-Time And Embedded Systems (C.3 ... )
 
 
General (C.2.0 )
 
 
Security and Protection (D.4.6 )
 
 
Security and Protection (K.6.5 )
 
 
VLSI Systems (C.5.4 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "System Architectures": Date
High-performance computer architecture
Stone H., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1987. Type: Book (9789780201168020)
Oct 1 1988
Introduction to computer architecture and organization: 2nd edition
Lorin H., Wiley-Interscience, New York, NY, 1989. Type: Book (9789780471614043)
Mar 1 1990
Computation structures
Ward S., Robert H. J., MIT Press, Cambridge, MA, 1990. Type: Book (9789780070681477)
Dec 1 1990
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy