Abstract
In this paper we categorise the goals of attackers of consumer electronic devices and identify common attack vectors. The challenges of implementing a security solution on consumer electronic devices are discussed and a defence strategy against common current and future attacks is outlined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson R. Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2001
Arbaugh W. A. Farber D. J. Smith J. M. A secure and reliable bootstrap architecture, In IEEE Symposium on Security and Privacy, 1997, p. 65–2
Bernstein D. J. Cache-timing attacks on AES 2005
Daniel C. Kleffel T. Hacking TomTomGo, In 22’ Chaos Communication Congress 2005
Figueiredo R. Dinda P. A. Fortes J. IEEE Computer Magazine: Virtualization Technologies, vol 38, no 5. May 2005
Hoglund G. McGraw G. Exploiting Software: How to Break Code, AddisonWesley 2004
Huang A. Hacking the Xbox: An Introduction to Reverse Engineering, No Starch Press 2003
Kocher P. Jaffe J. Jun Introduction to Differential Power Analysis and Related Attacks, Cryptography Research Inc.White Paper 1998
McAffee, & NTT DoCoMo The Future of Mobile Security-Here Today 2005, p 3–4
Lie D. Thekkath C. Mitchell M. Lincon P. Boneh D. Mitchell J. Horowitz M. Architectural Support for Copy and Tamper Resistant Software. In 9th International Conference on Architectural Support for Programming Languages and Operating Systems SAPLOS-IX, 2000, p.169–177
Liedtke J. On Micro-Kernel Construction. In 15th ACM Symposium on Operating System Principles, 1995, p. 237-250
Mitchell C. Trusted Computing IEE. Professional Applications of Computing Series 6, 2005
Mulliner C. Exploiting Pocket PC, What the Hack! 2005
Szor P. The Art of Computer Virus Research and Defence, Addison Wesley 2005
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Kan, T., Kerins, T., Kursawe, K. (2006). Security in Next Generation Consumer Electronic Devices. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9195-2_6
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0213-2
Online ISBN: 978-3-8348-9195-2
eBook Packages: Computer ScienceComputer Science (R0)