INTEGRATION OF HARDWARE SECURITY MODULES INTO A DEEPLY EMBEDDED TLS STACK
نویسندگان
چکیده
منابع مشابه
Hardware Security Modules for Embedded Systems
Being able to trust another IT system that “it always acts as expected” requires consecutive trust into all layers, which are involved in creating a trustworthy IT system. Figure 1 depicts the “pyramid of trust” for a typical IT system, where trust into the whole IT system requires that each layer can rely on the effective security of its underlying layer without being able to verify it directl...
متن کاملAndroid Stack Integration in Embedded Systems
Smartphone usage has increased manifold upon introduction of Google’s Android. Since its introduction, Android has evolved at an outstanding pace in terms of application development, commercialization and market share of Android powered devices. Although originally developed for smartphones, now the embedded system industry has realized the capabilities of Android. Due to open source nature, ri...
متن کاملAn Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملAn Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملAn Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2016
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.15.1.827