A Survey of Information Security Implementations for Embedded Systems


This paper examines security implementations that support the objectives of information confidentiality, integrity, and availability (the CIA triad1 ). The focus of this paper is on security implementations for embedded systems. The implementations described are widely applicable to embedded systems in a variety of markets, including aerospace, automotive, defense, industrial, medical, and networking, and are directly applicable to the protection of the intellectual property (IP) of the vendor.

Return to Resource Center