Secure Embedded Systems

reportActive / Technical Report | Accession Number: AD1033856 | Open PDF

Abstract:

Developers seek to seamlessly integrate cybersecurity on military systems. However, when implementing security features in an embedded system, which has a dedicated function, developers must add security components that often compromise system functionality. To avoid this compromise, system developers desire a well-defined, systematic code sign approach for embedded system functionality and cybersecurity. Lincoln Laboratorys secure embedded system methodology uses a security coprocessor to cryptographically ensure system confidentiality and integrity while maintaining functionality.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release;

RECORD

Collection: TR
Identifying Numbers
Subject Terms