Trusted Computing for Embedded Systems /

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and softwar...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Candaele, Bernard (Editor), Soudris, Dimitrios (Editor), Anagnostopoulos, Iraklis (Editor)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2015.
Subjects:
Online Access:Click here to view the full text content
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Part I Introduction
  • Programming Interfaces for the TPM
  • Part II Application-Use cases
  • Chapter 2: ARM TrustZone
  • Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges
  • Authentication and mutual authentication
  • Low power Wireless Sensor Networks: Secure applications and remote distribution of FW updates with key management on WSN
  • Part III Building blocks
  • Physically Unclonable Function: Principle, design and characterization of the Loop PUF
  • Physically Unclonable Function: Design of a silicon arbiter-PUF on CMOS 65 nm
  • Secure Key Generator using a Loop-PUF
  • Fault Sensitivity Analysis at Design Time
  • Information Theoretic Comparison of Side-channel Distinguishers
  • Part III Advanced Galileo Positioning technologies
  • Wireless Sensor Networks: Routing protocol for critical infrastructure protection
  • Wireless Sensor Networks: Virtual platform for performance analysis and attack simulation
  • Heap management for trusted operating environments
  • IP-XACT extensions for cryptographic IP.