Security in Next Generation Consumer Electronic Devices

  • Tom Kan
  • Tim Kerins
  • Klaus Kursawe


In this paper we categorise the goals of attackers of consumer electronic devices and identify common attack vectors. The challenges of implementing a security solution on consumer electronic devices are discussed and a defence strategy against common current and future attacks is outlined.


Code Image Trusted Platform Module Buffer Overflow Security Solution Virtual Machine Monitor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [AndeOl]
    Anderson R. Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2001Google Scholar
  2. [ArFS97]
    Arbaugh W. A. Farber D. J. Smith J. M. A secure and reliable bootstrap architecture, In IEEE Symposium on Security and Privacy, 1997, p. 65–2Google Scholar
  3. [BernOS]
    Bernstein D. J. Cache-timing attacks on AES 2005Google Scholar
  4. [DaKlO5]
    Daniel C. Kleffel T. Hacking TomTomGo, In 22’ Chaos Communication Congress 2005Google Scholar
  5. [FiDFO5]
    Figueiredo R. Dinda P. A. Fortes J. IEEE Computer Magazine: Virtualization Technologies, vol 38, no 5. May 2005Google Scholar
  6. [HoMcO4]
    Hoglund G. McGraw G. Exploiting Software: How to Break Code, AddisonWesley 2004Google Scholar
  7. [HuanO3]
    Huang A. Hacking the Xbox: An Introduction to Reverse Engineering, No Starch Press 2003Google Scholar
  8. [KoJJ98]
    Kocher P. Jaffe J. Jun Introduction to Differential Power Analysis and Related Attacks, Cryptography Research Inc.White Paper 1998Google Scholar
  9. [McDo05]
    McAffee, & NTT DoCoMo The Future of Mobile Security-Here Today 2005, p 3–4Google Scholar
  10. [LTMP00]
    Lie D. Thekkath C. Mitchell M. Lincon P. Boneh D. Mitchell J. Horowitz M. Architectural Support for Copy and Tamper Resistant Software. In 9th International Conference on Architectural Support for Programming Languages and Operating Systems SAPLOS-IX, 2000, p.169–177Google Scholar
  11. [Lied95]
    Liedtke J. On Micro-Kernel Construction. In 15th ACM Symposium on Operating System Principles, 1995, p. 237-250Google Scholar
  12. [MitcOS]
    Mitchell C. Trusted Computing IEE. Professional Applications of Computing Series 6, 2005Google Scholar
  13. [MullO5]
    Mulliner C. Exploiting Pocket PC, What the Hack! 2005Google Scholar
  14. [SzorOS]
    Szor P. The Art of Computer Virus Research and Defence, Addison Wesley 2005Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Tom Kan
    • 1
  • Tim Kerins
    • 1
  • Klaus Kursawe
    • 1
  1. 1.Information and System Security GroupPhilips Research EuropeEindhovenThe Netherlands

Personalised recommendations