IA 2 - UNIT 3 Flashcards

1
Q

an electronic product that contains a microprocessor (one or more) and software to perform some constituent function within a larger entity.

A

embedded system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ability of an entity to protect resources for which
it bears protection responsibility.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

implemented withinembedded systems to protect data integrity, confidentiality, and authenticity

A

Cryptographic techniques and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Security Considerations for
Embedded Hardware

A
  1. Security Importance
  2. Resource Limitations
  3. Data Protection
  4. Key Security Requirements
  5. External Connectivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security is crucial in IT development to protect intellectual property and individual privacy, including in embedded hardware.

A

Security Importance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Embedded hardware faces constraints such as limited resources for implementing security measures.

A

Resource Limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure stored information, especially personal data, through encryption and strict access controls.

A

Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Prevent Reverse Engineering - Protect source code and internal functionalities
  • Control Internal Access - Platforms should lock internal access
  • Protect Against Side Channel Attacks -Counteract potential information leakage through power consumption or electromagnetic emissions
A

Key Security
Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Confidentiality - Prevent data interception.
  • Authenticity - Verify trust between embedded hardware and external entities.
  • IntegritY - Guard against message tampering.
A

External Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of Embedded
Systems

A
  1. Traffic management
  2. security systems
  3. printer
  4. oven
  5. fax machine
  6. television
  7. audio system
  8. ultra sound machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • are specially designed computer chips that are made for one specific task. They are very powerful and efficient at doing that task, but they can be expensive to create since they are custom-built.
  • give complete control over how the hardware works, which means they can offer high security and performance.
A

Application Specific Integrated Circuits (ASIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • are chips that can be reprogrammed even after they’re made. This makes them flexible and affordable to use for different tasks
  • are great for projects that need quick changes or customized hardware, like testing new ideas or processing data.
A

Field Programmable Gate Arrays (FPGA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • These systems use general-purpose microcontrollers to perform specific tasks in devices. They are affordable and use little power.
  • They are perfect for simple or low-power devices, like those used in home automation and wearables.
A

Microprocessor-Based Embedded Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • are small computers with all the basic parts. They can handle more complex tasks than simple microcontrollers.
  • They are ideal for projects that need a full computer, like in IoT systems or industrial automation.
A

Single-Board Computers (SBCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Classification of Embedded
Systems

A
  1. Application Specific Integrated Circuits (ASIC)
  2. Field Programmable Gate Arrays (FPGA)
  3. Microprocessor-Based Embedded Systems
  4. Single-Board Computers (SBCs)
  5. General Purpose Mobile Platforms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These platforms use smartphones or tablets as embedded systems to run various applications. They take advantage of the powerful hardware and features that are already built into mobile devices.

They are ideal for apps that benefit from mobile features, such as cameras, GPS, and internet connectivity.

A

General Purpose Mobile Platforms

16
Q

Security Requirements and
Mechanisms

A
  1. Secret key (symmetric) cryptography
  2. Public key (asymmetric) cryptography
17
Q

Fulfilling Key Security Requirements
in Embedded Systems

A
  1. Authentication of Both Ends
  2. Confidentiality of the message
  3. Checking the integrity of the message
  4. Secure messaging
  5. Storage Security
18
Q

Detailed Security
Considerations

A
  1. User- and Service-Related Security
    2.Hardware Vulnerabilities
19
Q

User Identification Methods to Identify Users

A
  1. Knowledge-based
  2. Token-based
  3. Biometric
20
Q

Types of Hardware Vulnerabilities

A
  1. Side Channel Attacks
  2. Fault Injection Attacks
  3. Physical Tampering
21
Q

Non-invasive attacks that extract internal information
by analyzing hardware behavior.

A

Side Channel
Attacks

22
Q

Attacks that induce hardware faults to create processing mistakes, revealing valuable information.

A

Fault Injection
Attacks

23
Q

Involves removing protective layers to access internal components of the integrated circuit (IC).

A

Physical
Tampering

24
Q

Protection Mechanisms

A
  1. Hardware Security
  2. Parallel Masking
  3. Malfunction Monitoring
  4. Tampering Detection
  5. Secure Elements
25
Q

Importance of precise hardware design
to mitigate attacks.

A

Hardware Security

25
Q

Use of parallel processes to mask
hardware operations.

A

Parallel Masking

26
Q

Continuous monitoring for malfunctions

A

Malfunction Monitoring

27
Q

Implementation of detection
mechanisms for physical tampering

A

Tampering Detection

28
Q

Recommendation to utilize pre-designed
secure elements (SE) in commercial
microprocessors and microcontrollers
for enhanced security.

A

Secure Elements

29
Q

Pros
Software-Based Implementations

A
  1. Platform Independence
  2. Functionality Coverage
  3. Easier
  4. More Flexible Implementation
29
Q

Cons
Software-Based Implementations

A
  1. Susceptibility to Hardware Vulnerabilities
  2. Open General-Purpose Platforms
  3. Risks of Cross-Application Data
  4. Flaws in Security Design
  5. Slower Computational Time
29
Q

Security Solutions in Embedded Hardware

A
  1. Field- Programmable Gate Array
  2. Intellectual Property Cores (IP Cores)
  3. Security Co-Processor (SE)
  4. Trusted Execution Environment (TEE)
30
Q

Embedded Systems Real-World
Applications

A
  1. industrial robots
  2. digital cameras
  3. set top boxes
  4. gps receivers
  5. dvd players
  6. gaming consoles
  7. smartphones
  8. wireless routers
  9. automobile
31
Q

Current Challenges and Future
Directions

A
  1. increasing attack surface
  2. complexity of firmware management
  3. limited processing power
  4. supply chain vulnerabilities
  5. user awareness training
32
Q

Emerging Trends in Embedded
Security

A
  1. ai and machine learning
  2. edge computing security
  3. secure hardware elements
  4. zero trust architecture
  5. blockchain for device authentication
33
Q

Best Practices Of
Embedded Testing

A
  1. early testing integration
  2. use of automation
  3. continous integration
  4. use of multi-factor authentication
  5. regulatory conformity