10 Properties of Secure Embedded Systems

October 2, 2020

When attacking an intelligent edge system, it takes only one vulnerability to lead to an exploit.

When tasked with securing an intelligent edge system, you (the defender) must be prepared to protect against every possible vulnerability. Overlook a single opening and the attacker may find it, take control, steal your secrets, and create an exploit for others to use anytime, anywhere. Worse yet, that same attacker may use an initial compromised device to pivot from one exploited subsystem to another, causing further damage to your network, mission, and reputation. This white paper covers the most important security design principles that, if adhered to, give you a fighting chance against any attacker who seeks to gain unauthorized access, reverse engineer, steal sensitive information, or otherwise tamper with your embedded system.

The beauty of these 10 principles is that they can be layered together into a cohesive set of countermeasures that achieve a multiplicative effect, making device exploitation significantly more difficult and costly for the attacker.

Previous
Ask the Expert: Medical Device Cybersecurity Simulation Testing
Ask the Expert: Medical Device Cybersecurity Simulation Testing

Expert discusses cybersecurity for medical devices: reducing risk with pen testing.

Next
The Digital Twin: Overcoming Minor Challenges to Uncover Massive Opportunities
The Digital Twin: Overcoming Minor Challenges to Uncover Massive Opportunities

Digital Twin is an increasingly common term. Unfortunately, when the topic of Digital Twin comes up the con...

×



Discuss your organization’s cybersecurity needs with a Wind River expert

First Name
Last Name
Company
Industry
Job Title - optional
Phone - optional
Country
State
Province/Territory
Province
Prefecture
County
Comments - optional
I agree to receive marketing materials and other information about Wind River’s products & services.
Thank you. You'll be contacted shortly.
Error - something went wrong!