Embedded systems security
Article REF: H8280 V2

Embedded systems security

Author : Lilian BOSSUET

Publication date: October 10, 2024 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

Overview

ABSTRACT

Embedded systems are ubiquitous in our modern societies. They are complex because they combine advanced software features, highly heterogeneous integrated hardware resources such as systems-on-chip, and more and more often communication capabilities. Their design is tightly constrained to enable optimum integration in the host system (car, plane, household appliances, etc.). This article discusses the security of embedded systems, which are vulnerable to many software, hardware, and mixed threats. The main principles of software and physical attacks are presented to help the reader understand the main protection strategies.

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHOR

  • Lilian BOSSUET: University Professor - Laboratoire Hubert Curien, CNRS UMR5516, Jean Monnet University, Saint-Étienne

 INTRODUCTION

Embedded systems are the cornerstone of the technological architecture of modern society. They are present in every aspect of modern life. From the moment we wake up to the moment we go to bed (and even during the night), they accompany us on our journeys in vehicles or on public transport, in our leisure activities associated with connected objects, in our homes where home automation is becoming widespread to increase our comfort and limit our energy needs, in our consumer actions via our means of payment and, of course, in every facet of our professional activities. Beyond the individual, embedded systems are ultra-present in industry and its evolution (Industry 4.0), in the Internet of Things, in energy distribution, and in the defense and protection of nations. Given the importance of embedded systems in our society, it's easy to understand how critical their security is. But are they protected from all threats? On the contrary, except to a certain extent (systems for which security is a constraint by definition – for example, military and banking applications –), embedded systems are very much under threat, not only from software and network attacks (like all IT systems), but also from physical attacks targeting their electronic and microelectronic parts.

This article presents the main attack strategies targeting embedded systems and their software and hardware components. It also presents the main defense and protection strategies. Embedded systems are complex, combining advanced software functionalities, highly heterogeneous integrated hardware resources such as systems-on-a-chip and, increasingly often, communication capabilities. Protecting them is a delicate exercise, which cannot result in total security. Designers need to address all levels of design, and pay particular attention to safety at every stage. To achieve this, they need to be aware of the potential threats to the embedded systems they are developing, and to have an idea of the possibilities for protection, which is what this article proposes to address.

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


KEYWORDS

embedded system   |   hardware security   |   software security   |   attack   |   countermeasure

EDITIONS

Other editions of this article are available:

Ongoing reading
Safety of embedded systems

Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details