A Guide to Securing your Embedded Memory
IN THIS GUIDE YOU WILL DISCOVER HOW MEMORY MIGHT BE ATTACKED AND THE CHALLENGES ASSOCIATED WITH MAKING YOUR DATA MORE SECURE.
Embedded memory must be secured to protect against unauthorised access by hackers, intent on stealing or corrupting data. In the case of data corruption, and in the industrial electronics sector, for example, the hack might be made with a view to disrupting a process, and safety can be compromised. Hacks of networked devices are often made to access passwords and grant access to other systems.
This guide provides advice on how to protect your embedded memory and looks at off-the-shelf solutions with built-in security.
Content includes:
- What is embedded memory?
- What is embedded memory used for?
- Memory management
- How might embedded memory be attacked?
- Memory buffer overflow attack
- Security challenges for embedded memory
- How to secure embedded memory
- Tamper proof memory
- Common criteria evaluation assurance level