Trusted Computing for Embedded Systems

  • Bernard Candaele
  • Dimitrios Soudris
  • Iraklis Anagnostopoulos

Table of contents

  1. Front Matter
    Pages i-xxvi
  2. Introduction

    1. Front Matter
      Pages 1-1
    2. Ronald Toegl, Thomas Winkler, Mohammad Nauman, Theodore W. Hong, Johannes Winter, Michael Gissing
      Pages 3-32
  3. Applications-Use Cases

    1. Front Matter
      Pages 33-33
    2. Jon Geater
      Pages 35-45
    3. Alessandro Barenghi, Luca Breveglieri, Mariagrazia Fugini, Gerardo Pelosi
      Pages 47-59
    4. Asad Ali, François Tuot, Gerald Maunier
      Pages 61-69
    5. Juan Rico, Juan Sancho, Álvaro Díaz, Javier González, Pablo Sánchez, Bibiana Lorente Alvarez et al.
      Pages 71-111
  4. Building Blocks

    1. Front Matter
      Pages 113-113
    2. Zouha Cherif, Jean-Luc Danger, Florent Lozac’h, Philippe Nguyen
      Pages 115-133
    3. Guillaume Reymond, Jacques J. A. Fournier
      Pages 135-142
    4. Julien Francq, Geoffrey Parlier
      Pages 143-173
    5. Alessandro Barenghi, Luca Breveglieri, Andrea Palomba, Gerardo Pelosi
      Pages 175-186
    6. Annelie Heuser, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger
      Pages 187-225
    7. Apostolos Leventis, Konstantinos Papadopoulos
      Pages 227-246
    8. Álvaro Díaz, Javier González, Pablo Sánchez
      Pages 247-269
    9. Iraklis Anagnostopoulos, Ioannis Koutras, Christos Andrikos, Dimitrios Soudris
      Pages 271-284
    10. Emmanuel Vaumorin, Bernard Kasser, Sylvain Duvillard, Albert Martinez
      Pages 285-294
  5. Back Matter
    Pages 295-299

About this book

Introduction

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc.

·         Enables readers to address a variety of security threats to embedded hardware and software;

·         Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems;

·         Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

 

Keywords

Embedded Systems Hardware Security and Trust Integrated Circuit Design Secure Embedded Systems Secure Integrated Circuits Trusted Computing

Editors and affiliations

  • Bernard Candaele
    • 1
  • Dimitrios Soudris
    • 2
  • Iraklis Anagnostopoulos
    • 3
  1. 1.Thales CommunicationsColombesFrance
  2. 2.Department of Computer ScienceNational Technical University of AthensAthensGreece
  3. 3.Department of Computer ScienceNational Technical University of AthensAthensGreece

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-09420-5
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-09419-9
  • Online ISBN 978-3-319-09420-5
  • About this book
Industry Sectors
Pharma
Automotive
Biotechnology
Electronics
Telecommunications
Energy, Utilities & Environment
Aerospace