Practical Secure Hardware Design for Embedded Systems (Part 1 of 2)
Page 1 of 7
Next >
Properly designing embedded security systems requires an understanding of what you are trying to protect in your product, why you are protecting it, and what types of attackers will likely target your product. In part 1 of a two-part series, Joe Grand provides a good background into the types of security technologies, mechanisms, and attacks that exist.
Introduction
This article provides practical design details and attack examples for the product enclosure and circuit board of hardware products. Although implementing proper security into your product requires an understanding of your attacker, what you are protecting, and why you are protecting it, this article is a good background into the types of security technologies, mechanisms, and attacks that exist. More information on embedded security and product analysis can be found at Joe Grand's web site, Grand Idea Studio.
Page 1 of 7
Next >