All Questions
7
questions
1
vote
2
answers
803
views
How do I implement authentication on an embedded device? [closed]
I have been reading a lot about encryption lately but most sources just care about making sure that the connection between two parties is secure. I want to know how I can be sure that the party I am ...
25
votes
5
answers
7k
views
Why are SRAM based FPGA used more than NVM based FPGA?
SRAM based FPGAs need to load the bitstream again after power off. Meanwhile the Non-Volatile based one don't need that.
I wonder, why are more experiments and security research done on the SRAM ...
7
votes
3
answers
3k
views
securely storing and using keys in an embedded system
I'm using a microprocessor - PIC32MZ2048efm144 MCU that receives commands encrypted with a specific key, decrypts them and executes the command.
The encrypted commands are stored offline, so I cannot ...
-3
votes
1
answer
119
views
Anti case violation system for embedded products
I'm developing an embedded system that contains critical information inside. When someone tries to violate the case to obtain access to the board, the system should detect it and erase all the data ...
7
votes
2
answers
3k
views
Is there a way to prevent code being read from an MSP430 without blowing the fuse?
I was recently involved at a project in a small company where we had fears of someone taking the code from the master chip, an MSP430F2419, and using it for a competing product. We ended up blowing ...
3
votes
2
answers
914
views
How to add security to your Product
I've been trying to build up certain Embedded systems and i wonder how people make them secure. Or else it would have been reproduced well. I know there is an extent to provide security if you are ...
6
votes
1
answer
380
views
Examples of DRM on embedded systems
I'm tasked with implementing a DRM on an embedded system. The device would have a limited number of times which it can run, after which it would be disabled, until it syncs with a computer with an ...