Embedded Systems Security

1st Edition

Practical Methods for Safe and Secure Software and Systems Development

Print ISBN: 9780123868862
eBook ISBN: 9780123868879
Imprint: Newnes
Published Date: 16th March 2012
Page Count: 416
64.95 + applicable tax
39.99 + applicable tax
49.95 + applicable tax
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


The ultimate resource for making embedded systems reliable, safe, and secure

Embedded Systems Security provides:

  • A broad understanding of security principles, concerns, and technologies
  • Proven techniques for the efficient development of safe and secure embedded software
  • A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems
  • Nuggets of practical advice and numerous case studies throughout

Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world’s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems.

This book is indispensable for embedded systems and security professionals, new and experienced.

An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market.

  • Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group

Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology.

  • Adriel Desautels, President and CTO, Netragard, LLC.

Security of embedded

Key Features

  • Gain an understanding of the operating systems, microprocessors, and network security critical issues that must be considered when designing secure embedded systems
  • Contains nuggets of practical and simple advice on critical issues highlighted throughout the text
  • Short and to –the- point real case studies included to demonstrate embedded systems security in practice


Entry level to senior Software Developers, Systems Engineers, Engineering Architets. Software developers and engineers in any computer software and/or network security field.

Table of Contents





Chapter 1. Introduction to Embedded Systems Security

1.1 What is Security?

1.2 What is an Embedded System?

1.3 Embedded Security Trends

1.4 Security Policies

1.5 Security Threats

1.6 Wrap-up

1.7 Key Points

1.8 Bibliography and Notes

Chapter 2. Systems Software Considerations

2.1 The Role of the Operating System

2.2 Multiple Independent Levels of Security

2.3 Microkernel versus Monolith

2.4 Core Embedded Operating System Security Requirements

2.5 Access Control and Capabilities

2.6 Hypervisors and System Virtualization

2.7 I/O Virtualization

2.8 Remote Management

2.9 Assuring Integrity of the TCB

2.10 Key Points

2.11 Bibliography and Notes

Chapter 3. Secure Embedded Software Development

3.1 Introduction to PHASE—Principles of High-Assurance Software Engineering

3.2 Minimal Implementation

3.3 Component Architecture

3.4 Least Privilege

3.5 Secure Development Process

3.6 Independent Expert Validation

3.7 Case Study: HAWS—High-Assurance Web Server

3.8 Model-Driven Design

3.9 Key Points

3.10 Bibliography and Notes

Chapter 4. Embedded Cryptography

4.1 Introduction

4.2 U.S. Government Cryptographic Guidance

4.3 The One-Time Pad

4.4 Cryptographic Modes

4.5 Block Ciphers

4.6 Authenticated Encryption

4.7 Public Key Cryptography

4.8 Key Agreement

4.9 Public Key Authentication

4.10 Elliptic Curve Cryptography

4.11 Cryptographic Hashes

4.12 Message Authentication Codes

4.13 Random Number Generation

4.14 Key Management for Embedded Systems

4.15 Cryptographic Certifications

4.16 Key Points

4.14 Bibliography and Notes</


No. of pages:
© Newnes 2012
eBook ISBN:
Paperback ISBN:


"The illustrations are a very strong part of this book. They are well conceived, always to the point, and in color. One interesting editorial feature is the so-called ‘Key Points,’ boxes that interrupt the text with a framed statement emphasizing a single important aspect. In addition, the book has very good bibliographical notes, which are extremely rare in this type of publication. Each chapter is followed by an extensive list of relevant citations, often with accompanying explanations…Overall, the book is very enlightening and engineers can learn a lot from it."--Computing Reviews.com, December 28, 2012
"Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology."--Adriel Desautels, President and CTO, Netragard, LLC
"Written by leading authorities on security in embedded systems (a lead designer of an NSA certified cryptographic system and a lead developer on the single highest rated software product in the Common Criteria security certification rating system), this book provides an overview of security principles, vulnerability concerns and applicable technologies. Real world examples of system weakness and exploitation illustrate the need for security in development and give practical advice for effective techniques to counteract threats. Areas addressed include data protection protocols, emerging embedded systems, networking, cryptography, system architecture, hypervisors, operating systems and storage."--Reference and Research Book News, August 2012, page 186