<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Is embedded security necessary?</title>
	<atom:link href="http://www.embeddedinsights.com/channels/2011/02/16/is-embedded-security-necessary/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.embeddedinsights.com/channels/2011/02/16/is-embedded-security-necessary/</link>
	<description>Shedding Light on the Hidden World of Embedded Systems</description>
	<lastBuildDate>Mon, 28 Jul 2014 16:18:37 -0400</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0</generator>
	<item>
		<title>By: Gaurav Agarwal, TI</title>
		<link>http://www.embeddedinsights.com/channels/2011/02/16/is-embedded-security-necessary/#comment-5588</link>
		<dc:creator>Gaurav Agarwal, TI</dc:creator>
		<pubDate>Fri, 18 Feb 2011 14:49:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.embeddedinsights.com/channels/?p=450#comment-5588</guid>
		<description>As more and more embedded devices in the consumer space are getting attached to the network and many of these devices are without sophisticated security support, I see a real threat. 

Imagine a set-top box (or a video game console or a TV) connected to the network. And someone with the desire to cause physical harm corrupts the application stored on the flash. Next time the power cycle is needed, the device won&#039;t start. The device now has to be sent back to the manufacturing facility or would need a visit from a technician. What if, instead of corrupting the code, the application is carefully changed to run specific functionalities that can cause more harm on the other systems in the network in the vicinity or sniff on important personal data from other systems. Doing this on embedded systems is relatively difficult as compared to a PC. However, with increasing popularity of embedded systems, the expertise about these systems is becoming widespread.

I believe that this threat will become more prominent in this decade. A two tier security (Hardware + Software) should be used to provide proper defense mechanisms against these threats. 

With the life cycle of more than just a couple of years, these embedded systems will need more security than just the effort for someone to understand these systems. If you are an embedded system designer, now is the time...</description>
		<content:encoded><![CDATA[<p>As more and more embedded devices in the consumer space are getting attached to the network and many of these devices are without sophisticated security support, I see a real threat. </p>
<p>Imagine a set-top box (or a video game console or a TV) connected to the network. And someone with the desire to cause physical harm corrupts the application stored on the flash. Next time the power cycle is needed, the device won&#8217;t start. The device now has to be sent back to the manufacturing facility or would need a visit from a technician. What if, instead of corrupting the code, the application is carefully changed to run specific functionalities that can cause more harm on the other systems in the network in the vicinity or sniff on important personal data from other systems. Doing this on embedded systems is relatively difficult as compared to a PC. However, with increasing popularity of embedded systems, the expertise about these systems is becoming widespread.</p>
<p>I believe that this threat will become more prominent in this decade. A two tier security (Hardware + Software) should be used to provide proper defense mechanisms against these threats. </p>
<p>With the life cycle of more than just a couple of years, these embedded systems will need more security than just the effort for someone to understand these systems. If you are an embedded system designer, now is the time&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: tz</title>
		<link>http://www.embeddedinsights.com/channels/2011/02/16/is-embedded-security-necessary/#comment-5577</link>
		<dc:creator>tz</dc:creator>
		<pubDate>Thu, 17 Feb 2011 21:40:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.embeddedinsights.com/channels/?p=450#comment-5577</guid>
		<description>It is worse than that.  There have been lawsuits over breathalyzers (which can declare you guilty and send you to jail) where the vendor didn&#039;t want to reveal the source, and when it was eventually analyzed was shown to be buggy.

Or the tire pressure monitors - which are inherently wireless - can be spoofed to the point it can shut down a car.

The first problem is you really need to analyze the actual threats, and then meet them.  Embedded device has a wide meaning (remembering the Naval ships that were literally dead in the water because of an NT bug but most people don&#039;t consider windows to be an embedded system).

The motorola 6809 that had an (invalid) instruction that would destroy the chip (radio shack color computer).

Most of what I first think of when hearing the term embedded devices are running from read-only flash (as opposed to something like an SD card).  The firmware can be updated, but not partially.  This limits the exploits.  They typically are behind routers (NAT) and initiate connections so it is difficult to do an exploit.  Not impossible, but again what is the threat.  Could you zap the device by uploading a bad firmware image?  Can you hack the firmware to make it open to exploits?...

So the short answer, is probably, &quot;Yes&quot; - security is important, but only in the same sense that any quality or safety problem should be considered.</description>
		<content:encoded><![CDATA[<p>It is worse than that.  There have been lawsuits over breathalyzers (which can declare you guilty and send you to jail) where the vendor didn&#8217;t want to reveal the source, and when it was eventually analyzed was shown to be buggy.</p>
<p>Or the tire pressure monitors &#8211; which are inherently wireless &#8211; can be spoofed to the point it can shut down a car.</p>
<p>The first problem is you really need to analyze the actual threats, and then meet them.  Embedded device has a wide meaning (remembering the Naval ships that were literally dead in the water because of an NT bug but most people don&#8217;t consider windows to be an embedded system).</p>
<p>The motorola 6809 that had an (invalid) instruction that would destroy the chip (radio shack color computer).</p>
<p>Most of what I first think of when hearing the term embedded devices are running from read-only flash (as opposed to something like an SD card).  The firmware can be updated, but not partially.  This limits the exploits.  They typically are behind routers (NAT) and initiate connections so it is difficult to do an exploit.  Not impossible, but again what is the threat.  Could you zap the device by uploading a bad firmware image?  Can you hack the firmware to make it open to exploits?&#8230;</p>
<p>So the short answer, is probably, &#8220;Yes&#8221; &#8211; security is important, but only in the same sense that any quality or safety problem should be considered.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jon Titus</title>
		<link>http://www.embeddedinsights.com/channels/2011/02/16/is-embedded-security-necessary/#comment-5573</link>
		<dc:creator>Jon Titus</dc:creator>
		<pubDate>Thu, 17 Feb 2011 15:42:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.embeddedinsights.com/channels/?p=450#comment-5573</guid>
		<description>Everyone I know has a locks on the doors to their home.  Who&#039;s responsible, the builder or the home-owner?  First, the owner has responsibility for his or her property, so they should maintain the locks, ensure they work, and change the key once in a while.  Technology changes and locks get easier to pick.  Maybe a fingerprint-detector lock next year?  Second, the builder has a responsibility to install the locks and perhaps even deadbolts before it turns over the home to a new owner.  Third, when the home buyer sells the property, the new owner must take responsibility for changing the locks.  So I say add at least a minimum level of security to embedded systems and let the the buyers add on higher levels of security or disable them as they wish.  (Add on security could get specified at the time of purchase or added later.  That&#039;s up to the buyer.)  Upon delivery, unless specified otherwise, the owner assumes responsibility.</description>
		<content:encoded><![CDATA[<p>Everyone I know has a locks on the doors to their home.  Who&#8217;s responsible, the builder or the home-owner?  First, the owner has responsibility for his or her property, so they should maintain the locks, ensure they work, and change the key once in a while.  Technology changes and locks get easier to pick.  Maybe a fingerprint-detector lock next year?  Second, the builder has a responsibility to install the locks and perhaps even deadbolts before it turns over the home to a new owner.  Third, when the home buyer sells the property, the new owner must take responsibility for changing the locks.  So I say add at least a minimum level of security to embedded systems and let the the buyers add on higher levels of security or disable them as they wish.  (Add on security could get specified at the time of purchase or added later.  That&#8217;s up to the buyer.)  Upon delivery, unless specified otherwise, the owner assumes responsibility.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
