Engineering Secure Devices

Engineering Secure Devices

$44.99

In stock
0 out of 5

$44.99

SKU: 9781718503489 Categories: ,
Title Range Discount
Trade Discount 5 + 25%

Description

This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.

With the rise of the Internet of Things (IoT) and the increased connectivity of smart devices that rely on an embedded computer system at their core, the need for affordable yet effective security measures is higher than ever. This book takes you on a tour through the jungle of potential risks and protection measures, as well as the reasoning behind them, and practical implementation examples.

Based on hands-on experience and recent research insights, the journey starts with the basics for a secure development process and summarizes the cryptographic essentials relevant for practical security engineering. Next you’ll explore embedded security building blocks like random number generators, implementations options for cryptographic algorithms, secure data storage, unique device identities, and protected communication channels. Later chapters cover advanced device concepts like secure boot and firmware update processes, access control management, and system monitoring. Several case studies throughout will bridge the gap between theory and real-world practices, demonstrating the advantages—or disadvantages—of different implementations.Foreword
Introduction
Part I: Fundamentals
Chapter 1: Secure Development Process
Chapter 2: Cryptography
Part II: Device Security Building Blocks
Chapter 3: Random Number Generators
Chapter 4: Cryptographic Implementations
Chapter 5: Confidential Data Storage and Secure Memory
Chapter 6: Secure Device Identity
Chapter 7: Secure Communication
Part III: Advanced Device Security Concepts
Chapter 8: Secure Boot and System Integrity
Chapter 9: Secure Firmware Update
Chapter 10: Robust Device Architecture
Chapter 11: Access Control and Management
Chapter 12: System Monitoring
Afterword
Index“The book provides a well understandable introduction on how to design and implement secure embedded devices. Case studies exemplify the practical application of relevant security technologies, making this complex topic well accessible for both practitioners and students.” 
—Dr. Rainer Falk, Principal Key Expert for Embedded Security, Siemens AG

“This book has so much valuable and practical information on engineering secure devices with lessons learned by the author and comprehensible case studies. The detailed explanations of security basics and concepts allow the book to be used by beginners to get started on the topic, but even security professionals would definitely find it valuable. Whether you are a developer for an embedded system, responsible for product security, or just interested in the topic, this book is an excellent read!” 
—Matthias Niedermaier, OT Security Expert, Airbus

“This book is an indispensable technical guide for the design, implementation and maintenance of embedded systems in security-sensitive applications. It presents fundamental elements and illustrates how they are utilized in practice, providing seasoned insight into the construction of a secure embedded system.” 
—Marc Stöttinger, Professor for Computer Engineering and Security, RheinMain University of Applied Sciences

“An engaging book for anyone interested in getting a hands-on introduction into embedded system security. Plenty of real-world examples, enriched by anecdotes, make security concepts and mechanisms comprehensible. The book touched on a broad range of topics, encouraging the reader to delve into security engineering.” 
—Johannes Obermaier, security engineer and researcher

“Dominik Merli finally wrote the textbook that everyone teaching on embedded system security was waiting for. The focus on the practical aspects of real-world embedded systems with the relevant theoretical background makes it an excellent base for education and practitioners. I am really excited to use it in my courses.” 
—Stefan Wallentowitz, Professor, Embedded System Security, Hochschule München University of Applied Sciences

“This book is exactly what you need to read as an engineer working in the automotive, industrial, or IoT domain to level up with comprehensive security know-how — from secure design processes to comprehensive security concepts and their secure implementations. The scope clearly covers what is needed in practice.” 
—Dr. Johann Heyszl, Security Engineering Manager at GoogleDominik Merli is a professor for IT security at the Augsburg Technical University of Applied Sciences, with more than a decade of experience in security engineering research and the implementation of practical protection measures. His research on embedded systems’ security for industrial, automotive, and semiconductor companies led to his PhD at the Technical University of Munich, after which he worked on security innovations for industrial products at Siemens before entering the education field.US

Additional information

Imprint

Format

ISBN-13

ISBN-10

Author

Audience

BISAC

,

Subjects

hacking, tech, world history, design, math, computers, hackers, cryptography, geography, essays, mathematics, privacy, collection, cyber security, European history, computer books, cyber security books, penetration testing, hacking books, network security, computer security, penetration test, COM095000, COM083000, vampires, marxism, historical, crime, vampire, cybersecurity, renaissance, biography, biology, technology, classic, school, mystery, philosophy, supernatural, physics, economics, crypto, security, geology, folklore, art, computer, german, 21st century