Research and Application of Embedded Control Software Security Design
Security threats faced by embedded control software were analyzed: cloning, reverse engineering, and tampering. The embedded control software security design strategies and security analysis were presented from three aspects of security authentication chip, program encryption and decryption, integri...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Electric Drive for Locomotives
2018-01-01
|
| Series: | 机车电传动 |
| Subjects: | |
| Online Access: | http://edl.csrzic.com/thesisDetails#10.13890/j.issn.1000-128x.2018.05.013 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Security threats faced by embedded control software were analyzed: cloning, reverse engineering, and tampering. The embedded control software security design strategies and security analysis were presented from three aspects of security authentication chip, program encryption and decryption, integrity verification, and security processor. Finally, based on security authentication chip, symmetric and asymmetric encryption algorithm and embedded control softwarre for secure key memory, a security application solution was designed, which could protect the confidentiality, integrity and non-denied of the software. It has great reference value for the embedded controller design. |
|---|---|
| ISSN: | 1000-128X |