Abstract
Conventional measures do not sufficiently protect embedded systems against intruders and malware attacks of any kind. The main reason for this is that the system architectures are based on highly insecure and error-prone foundations. Whereas some time ago this shortcoming could still be partially coped with by swift counteraction, due to the fast data networks there are no reactive measures anymore that could compensate for the aggressors’ temporal advantage. Since computers employed for purposes of safety-related automation and control or in critical infrastructures are more and more connected to networks and are, thus, endangered by malware, new architectures for their hardware and software as presented here are necessary, which completely solve the security problems by their intrinsic properties.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Der Schädlings-Flut Herr werden (2012). Bundeswehr aktuell 48(4):5
Flame: http://www.en.wikipedia.org/wiki/Flame_(malware). Looked up 26 Nov 2013
Halang WA, Fitz R (2000) Speichersegmentierung in Datenverarbeitungsanlagen zum Schutz vor unbefugtem Eindringen. German patent registration DE 100 31 212 A1
Halang WA, Fitz R (2000) Kontextsensitive Speicherzuordnung in Datenverarbeitungsanlagen zum Schutz vor unbefugtem Ausspähen und Manipulieren von Daten. German patent registration DE 100 31 209 A1
Halang WA, Fitz R (2000) Gerätetechnische Schreibschutzkopplung zum Schutz digitaler Datenverarbeitungsanlagen vor Eindringlingen während der Installationsphase von Programmen. German patent 10051941, since 20 Oct 2000
Halang WA, Fitz R (2000) Offenbarendes Verfahren zur Überwachung ausführbarer oder interpretierbarer Daten in digitalen Datenverarbeitungsanlagen mittels gerätetechnischer Einrichtungen. German patent registration DE 100 55 118 A1
Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Security & Privacy 9(3):49–51
Rannenberg K, Pfitzmann A, Müller G (1997) Sicherheit, insbesondere mehrseitige IT-Sicherheit. In: Mehrseitige Sicherheit in der Kommunikationstechnik. Addison-Wesley, Bonn, pp 21–29
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Fitz, R., Halang, W.A., Zhang, L. (2015). Malware-Proof Embedded Systems. In: Park, J., Pan, Y., Kim, C., Yang, Y. (eds) Future Information Technology - II. Lecture Notes in Electrical Engineering, vol 329. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9558-6_18
Download citation
DOI: https://doi.org/10.1007/978-94-017-9558-6_18
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9557-9
Online ISBN: 978-94-017-9558-6
eBook Packages: EngineeringEngineering (R0)