Skip to main content

Security in Next Generation Consumer Electronic Devices

  • Chapter
ISSE 2006 — Securing Electronic Busines Processes

Abstract

In this paper we categorise the goals of attackers of consumer electronic devices and identify common attack vectors. The challenges of implementing a security solution on consumer electronic devices are discussed and a defence strategy against common current and future attacks is outlined.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson R. Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2001

    Google Scholar 

  2. Arbaugh W. A. Farber D. J. Smith J. M. A secure and reliable bootstrap architecture, In IEEE Symposium on Security and Privacy, 1997, p. 65–2

    Google Scholar 

  3. Bernstein D. J. Cache-timing attacks on AES 2005

    Google Scholar 

  4. Daniel C. Kleffel T. Hacking TomTomGo, In 22’ Chaos Communication Congress 2005

    Google Scholar 

  5. Figueiredo R. Dinda P. A. Fortes J. IEEE Computer Magazine: Virtualization Technologies, vol 38, no 5. May 2005

    Google Scholar 

  6. Hoglund G. McGraw G. Exploiting Software: How to Break Code, AddisonWesley 2004

    Google Scholar 

  7. Huang A. Hacking the Xbox: An Introduction to Reverse Engineering, No Starch Press 2003

    Google Scholar 

  8. Kocher P. Jaffe J. Jun Introduction to Differential Power Analysis and Related Attacks, Cryptography Research Inc.White Paper 1998

    Google Scholar 

  9. McAffee, & NTT DoCoMo The Future of Mobile Security-Here Today 2005, p 3–4

    Google Scholar 

  10. Lie D. Thekkath C. Mitchell M. Lincon P. Boneh D. Mitchell J. Horowitz M. Architectural Support for Copy and Tamper Resistant Software. In 9th International Conference on Architectural Support for Programming Languages and Operating Systems SAPLOS-IX, 2000, p.169–177

    Google Scholar 

  11. Liedtke J. On Micro-Kernel Construction. In 15th ACM Symposium on Operating System Principles, 1995, p. 237-250

    Google Scholar 

  12. Mitchell C. Trusted Computing IEE. Professional Applications of Computing Series 6, 2005

    Google Scholar 

  13. Mulliner C. Exploiting Pocket PC, What the Hack! 2005

    Google Scholar 

  14. Szor P. The Art of Computer Virus Research and Defence, Addison Wesley 2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Kan, T., Kerins, T., Kursawe, K. (2006). Security in Next Generation Consumer Electronic Devices. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9195-2_6

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0213-2

  • Online ISBN: 978-3-8348-9195-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics