Cover coming soon

Engineering Secure Devices

by Dominik Merli
March 2024, 264 pp.
Use coupon code PREORDER to get 25% off!

With the rise of the Internet of Things (IoT) and the increased connectivity of smart devices that rely on an embedded computer system at their core, the need for affordable yet effective security measures is higher than ever. This book takes you on a tour through the jungle of potential risks and protection measures, as well as the reasoning behind them, and practical implementation examples.

Based on hands-on experience and recent research insights, the journey starts with the basics for a secure development process and summarizes the cryptographic essentials relevant for practical security engineering. Next you'll explore embedded security building blocks like random number generators, implementations options for cryptographic algorithms, secure data storage, unique device identities, and protected communication channels. Later chapters cover advanced device concepts like secure boot and firmware update processes, access control management, and system monitoring. Several case studies throughout will bridge the gap between theory and real-world practices, demonstrating the advantages—or disadvantages—of different implementations.

Author Bio 

Dominik Merli is a professor for IT security at the Augsburg Technical University of Applied Sciences, with more than a decade of experience in security engineering research and the implementation of practical protection measures. His research on embedded systems' security for industrial, automotive, and semiconductor companies led to his PhD at the Technical University of Munich, after which he worked on security innovations for industrial products at Siemens before entering the education field.

Table of contents 

Part I: Fundamentals
Chapter 1: Secure Development Process
Chapter 2: Cryptography
Part II: Device Security Building Blocks
Chapter 3: Random Number Generators
Chapter 4: Cryptographic Implementations
Chapter 5: Confidential Data Storage and Secure Memory
Chapter 6: Secure Device Identity
Chapter 7: Secure Communication

Part III: Advanced Device Security Concepts
Chapter 8: Secure Boot and System Integrity
Chapter 9: Secure Firmware Update
Chapter 10: Robust Device Architecture
Chapter 11: Access Control and Management
Chapter 12: System Monitoring

The chapters in red are included in this Early Access PDF.