› Forums › Security › Discussions (Security) › Trusted Objects
Tagged: IoTStack_G6, SecureElement_H11, Security_S12
- This topic is empty.
-
AuthorPosts
-
-
July 5, 2020 at 5:24 am #42936
#Discussion(Security) #Product [ via IoTGroup ]
Headings…
| Trusted Objects publishes a Position Paper on Software & IP Protection f
NewsAuto extracted Text……
The term “software & IP protection” refers to the protection of OEM’s software code against security breaches.
The purpose of this position paper is to analyze the vulnerabilities leading to software & IP hacking and theft, to look at the different solutions and their gaps and to finally introduce a new concept adapted to embedded systems.
The term “software & IP protection” refers to the protection of OEM’s software code against security breaches.
The purpose of this position paper is to analyze the vulnerabilities leading to software & IP hacking and theft, to look at the different solutions and their gaps and to finally introduce a new concept adapted to embedded systems.
As the risk of security breaches is growing, it is no surprise that the management and protection of the software & IP have become major concerns for OEM executives.
The average direct revenue loss per security breach is now exceeding $3m (*) on top of which, indirect damages such as company brand reputation, safety and services efficiency can result from a weak protection of software & IP.
When referring to software & IP protection, the main vulnerabilities occur, 1) during the device manufacturing process, 2) on the off-the-shelf device and 3) during the OTA (Over The Air) software update.
In many cases, software & IP are programmed into the devices in clear, without any protection.
In order to perform OTA software updates securely, a secure channel must be established between the servers and the devices.
Security technologies have been deployed for decades to protect data and software, including state-of-the art cryptography, digital signature, secure boot, obfuscation of executables, to name just a few examples.
Should the security measures not address the 3 vulnerabilities mentioned above, like security at the manufacturing level for instance, it will create a hole in the security chain to protect software IP.
Read More..
AutoTextExtraction by Working BoT using SmartNews 1.03976805238 Build 04 April 2020
-
-
AuthorPosts
- You must be logged in to reply to this topic.