interesting video from Marc Brown, Vice President, Tools and Marketing Operations, Products Group Wind River
talking about Software Considerations for Securing Embedded Devices within Intel Embedded blog
interesting video from Marc Brown, Vice President, Tools and Marketing Operations, Products Group Wind River
talking about Software Considerations for Securing Embedded Devices within Intel Embedded blog
His approach and discussion is consistent with why Intel bought McAfee. The hardware layer is the only place where you can ensure that control of the processor remains set in the code instructions. While he is discussing mobile devices, the problem is endemic to the entire industry and the computing world in total.
Passwords and hardware codes can all be bypassed unless they are hard coded and immutable. So having the processor secured during production is a must. From there, you can have the OS build up virtual systems within the device with restrictions on what the applications can do within the device. By using the virtual system approach, you can also ensure that nasty code cannot be hidden in the root, because a virtual system does not have one and a new system is created on power up.
It is too bad that we have to go to these lengths to secure our computing devices, but we must.
DAB
His approach and discussion is consistent with why Intel bought McAfee. The hardware layer is the only place where you can ensure that control of the processor remains set in the code instructions. While he is discussing mobile devices, the problem is endemic to the entire industry and the computing world in total.
Passwords and hardware codes can all be bypassed unless they are hard coded and immutable. So having the processor secured during production is a must. From there, you can have the OS build up virtual systems within the device with restrictions on what the applications can do within the device. By using the virtual system approach, you can also ensure that nasty code cannot be hidden in the root, because a virtual system does not have one and a new system is created on power up.
It is too bad that we have to go to these lengths to secure our computing devices, but we must.
DAB
If I had a opportunity, i would like to try that virtual system. But Wind River may take a long time to improve it.