Trusted Objects

Forums Security Discussions (Security) Trusted Objects

  • This topic is empty.
Viewing 0 reply threads
  • Author
    Posts
    • #42936
      Telegram SmartBoT
      Moderator
      • Topic 5959
      • Replies 0
      • posts 5959
        @tgsmartbot

        #Discussion(Security) #Product [ via IoTGroup ]


        Headings…
        | Trusted Objects publishes a Position Paper on Software & IP Protection f
        News

        Auto extracted Text……

        The term “software & IP protection” refers to the protection of OEM’s software code against security breaches.
        The purpose of this position paper is to analyze the vulnerabilities leading to software & IP hacking and theft, to look at the different solutions and their gaps and to finally introduce a new concept adapted to embedded systems.
        The term “software & IP protection” refers to the protection of OEM’s software code against security breaches.
        The purpose of this position paper is to analyze the vulnerabilities leading to software & IP hacking and theft, to look at the different solutions and their gaps and to finally introduce a new concept adapted to embedded systems.
        As the risk of security breaches is growing, it is no surprise that the management and protection of the software & IP have become major concerns for OEM executives.
        The average direct revenue loss per security breach is now exceeding $3m (*) on top of which, indirect damages such as company brand reputation, safety and services efficiency can result from a weak protection of software & IP.
        When referring to software & IP protection, the main vulnerabilities occur, 1) during the device manufacturing process, 2) on the off-the-shelf device and 3) during the OTA (Over The Air) software update.
        In many cases, software & IP are programmed into the devices in clear, without any protection.
        In order to perform OTA software updates securely, a secure channel must be established between the servers and the devices.
        Security technologies have been deployed for decades to protect data and software, including state-of-the art cryptography, digital signature, secure boot, obfuscation of executables, to name just a few examples.
        Should the security measures not address the 3 vulnerabilities mentioned above, like security at the manufacturing level for instance, it will create a hole in the security chain to protect software IP.


        Read More..
        AutoTextExtraction by Working BoT using SmartNews 1.03976805238 Build 04 April 2020

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.