Secure Embedded Systems
MASSACHUSETTS INST OF TECH LEXINGTON LEXINGTON United States
Pagination or Media Count:
Developers seek to seamlessly integrate cybersecurity on military systems. However, when implementing security features in an embedded system, which has a dedicated function, developers must add security components that often compromise system functionality. To avoid this compromise, system developers desire a well-defined, systematic code sign approach for embedded system functionality and cybersecurity. Lincoln Laboratorys secure embedded system methodology uses a security coprocessor to cryptographically ensure system confidentiality and integrity while maintaining functionality.
- Computer Programming and Software