TY - GEN
T1 - Emerging frontiers in embedded security
AU - Kermani, Mehran Mozaffari
AU - Zhang, Meng
AU - Raghunathan, Anand
AU - Jha, Niraj K.
PY - 2013
Y1 - 2013
N2 - Computing platforms are expected to be deeply embedded within physical objects and people, creating an Internet of Things. These embedded computing platforms will enable a wide spectrum of applications, including implantable and wearable medical devices, smart homes, smart meters, brain-machine interfaces, physical infrastructure monitoring, and intelligent transportation systems. Unfortunately, the explosion in devices and connectivity creates a much larger attack surface, opening up new opportunities for malicious people and entities. Unless significant attention is paid to security, the Internet of Things could well be turned into an Internet of "Things to be Hacked"! In this paper, we provide an overview of trends in embedded computing and highlight their implications on secure embedded system design. While embedded security is not a new topic, we argue that the characteristics and usage models of emerging embedded computing platforms necessitate a fresh look at embedded security and new approaches to secure embedded system design. We discuss the challenges using two case studies, viz., medical devices and smart homes. We provide examples of hypothetical and real security attacks, discuss the unique security challenges faced by these systems, and describe some initial efforts towards addressing them.
AB - Computing platforms are expected to be deeply embedded within physical objects and people, creating an Internet of Things. These embedded computing platforms will enable a wide spectrum of applications, including implantable and wearable medical devices, smart homes, smart meters, brain-machine interfaces, physical infrastructure monitoring, and intelligent transportation systems. Unfortunately, the explosion in devices and connectivity creates a much larger attack surface, opening up new opportunities for malicious people and entities. Unless significant attention is paid to security, the Internet of Things could well be turned into an Internet of "Things to be Hacked"! In this paper, we provide an overview of trends in embedded computing and highlight their implications on secure embedded system design. While embedded security is not a new topic, we argue that the characteristics and usage models of emerging embedded computing platforms necessitate a fresh look at embedded security and new approaches to secure embedded system design. We discuss the challenges using two case studies, viz., medical devices and smart homes. We provide examples of hypothetical and real security attacks, discuss the unique security challenges faced by these systems, and describe some initial efforts towards addressing them.
UR - http://www.scopus.com/inward/record.url?scp=84875599346&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84875599346&partnerID=8YFLogxK
U2 - 10.1109/VLSID.2013.222
DO - 10.1109/VLSID.2013.222
M3 - Conference contribution
AN - SCOPUS:84875599346
SN - 9780769548890
T3 - Proceedings of the IEEE International Conference on VLSI Design
SP - 203
EP - 208
BT - Proceedings - 26th International Conference on VLSI Design, VLSID 2013 - Concurrently with 12th International Conference on Embedded Systems Design, ES 2013
T2 - 2013 26th International Conference on VLSI Design, VLSID 2013 and 12th International Conference on Embedded Systems, ES 2013
Y2 - 5 January 2013 through 10 January 2013
ER -