Skip to main content

All Questions

Tagged with
1 vote
2 answers
803 views

How do I implement authentication on an embedded device? [closed]

I have been reading a lot about encryption lately but most sources just care about making sure that the connection between two parties is secure. I want to know how I can be sure that the party I am ...
Vincent Kenbeek's user avatar
25 votes
5 answers
7k views

Why are SRAM based FPGA used more than NVM based FPGA?

SRAM based FPGAs need to load the bitstream again after power off. Meanwhile the Non-Volatile based one don't need that. I wonder, why are more experiments and security research done on the SRAM ...
Lavender's user avatar
  • 527
7 votes
3 answers
3k views

securely storing and using keys in an embedded system

I'm using a microprocessor - PIC32MZ2048efm144 MCU that receives commands encrypted with a specific key, decrypts them and executes the command. The encrypted commands are stored offline, so I cannot ...
Sonja's user avatar
  • 77
-3 votes
1 answer
119 views

Anti case violation system for embedded products

I'm developing an embedded system that contains critical information inside. When someone tries to violate the case to obtain access to the board, the system should detect it and erase all the data ...
Sassa's user avatar
  • 101
7 votes
2 answers
3k views

Is there a way to prevent code being read from an MSP430 without blowing the fuse?

I was recently involved at a project in a small company where we had fears of someone taking the code from the master chip, an MSP430F2419, and using it for a competing product. We ended up blowing ...
Dom's user avatar
  • 349
3 votes
2 answers
914 views

How to add security to your Product

I've been trying to build up certain Embedded systems and i wonder how people make them secure. Or else it would have been reproduced well. I know there is an extent to provide security if you are ...
Rookie91's user avatar
  • 2,138
6 votes
1 answer
380 views

Examples of DRM on embedded systems

I'm tasked with implementing a DRM on an embedded system. The device would have a limited number of times which it can run, after which it would be disabled, until it syncs with a computer with an ...
alexbb's user avatar
  • 309