top of page

Cybersecurity and Embedded Systems

Securing embedded systems

by Charles Parker


Embedded systems are all around us and everything you do. If you drive a car, have a

smartphone or connected consumer device (e.g., refrigerator, oven, thermostat, or another

device), you interact and depend on these.

One aspect of this that has not received enough attention is applying security. With many of

these devices, the features and OS may not be updated due to:

Costs (many of these have slim margins and updating them would be a significant

financial burden),

Not viable to update these or provide warranty work, or

They may consider this end of life (EoL).


While updates may not make financial sense, there is still the obligation to secure the devices.

To secure embedded systems, TPMs and other like devices have been used to secure secrets

and other data. To ensure none of the secrets are removed, a team from the University of

Vermont engineered a new method for engineering the chips. The nuance with other chips is

when the chip detects it has been compromised, the chip self-destructs.


This function as a security measure, as the secrets would then be gone, but also a tool for anti-

counterfeiting. This function is done by using Physically Unclonable functions (PUFs). This

creates a unique fingerprint for each chip.


For this to work, the chip increases the voltage to the PCB leads for the encryption keys. The

first method causes electromigration. This causes metal atoms to move from their location. This

creates voids and open circuits. The alternative method creates a short-circuit. The chip, which

is engineered to operate at under 1V, increases the V to 2.5V. This kills the chip.


About the author-

Charles Parker II has been working in the info sec field for over a decade, in the banking,

 medical, automotive, and staffing industries. Charles has matriculated and attained the MBA,

 MSA, JD, LLM, and is in the final stage of the PhD in Information Assurance and Security

 (ABD) from Capella University. Mr. Parker’s areas of interest include cryptography, AV, and

 SCADA.

Comments


Featured Posts
Check back soon
Once posts are published, you’ll see them here.
Recent Posts
Archive
Search By Tags
No tags yet.
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square
bottom of page