Thursday, August 3, 2017

How to: 7 Tips for Securing an Embedded System by Jacob Beningo

ElectronicKitSchool. - This is one information update from how to tips in this time with the article titled 7 Tips for Securing an Embedded System that written by Jacob Beningo and published in DesignNews site.

Image Courtesy of DesignNews

The Canadian University Dubai (CUD) is a destination of choice for those parents and students who value a Canadian student centered education grounded in the values of people, respect, integrity, diversity and excellence. CUD was created as a portal to Canadian education, so with that in mind, it was built on the model of the typical Canadian post-secondary educational  institution, where students are encouraged to be themselves, confident, distinctive, and creative analytical thinkers.  CUD offers exchange programs and pathways to a number of well-established programs in leading public universities across Canada.

Security, just like quality and many other embedded system attributes, must be considered at the start of the development cycle. Developers can’t build their system and then add security at the end. With more and more systems starting to connect to the Internet, there are more than a dozen best practices developers should follow to start securing their systems. Let’s explore several that any team can implement.

Start using ARM Trustzone

ARM Trustzone has been available on application processors for quite some time and it has been announced that ARM Trustzone will be available on new microcontrollers soon. While we may not be able to use Trustzone right now in a microcontroller environment, developers should be starting to explore its implications and how it can be used to write more secure software. If you have an ARM application processor, now is the time to start putting Trustzone to work.

Follow Language and Industry Best Practices

There are several programming language and industry best practices standards that embedded software developers should be using. Using MISRA-C/C++ can ensure that best practices are followed that use a subset of the chosen language. MISRA should be used regardless, but from a security standpoint and if developers are using C, then becoming familiar with and following the best practices in Cert-C is highly recommended. Cert-C is designed to provide recommended coding practices that prevent security vulnerabilities in software.

And now you read more about 7 Tips for Securing an Embedded System by Jacob Beningo that published in Gineersnow from original source using link HERE


Post a Comment