From the course: Programming Foundations: Secure Coding

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Physical security

Physical security

- So far, we haven't mentioned physical security. The reality is that it exists in all facets of security. That being said, when working in embedded devices, you've already lost the battle for physical security by default. In my opinion, this is one of the hardest aspects of secure coding in the embedded space. Simply because you cannot maintain physical security. Consider the case of building an embedded component for a car. Now, you can do everything possible to secure the device, but the communications bus from the car may have a problem. Your lack of control of the ancillary systems allows your systems data to be manipulated or stolen. So now let's take a closer look at the device itself. Every port and every exposed plug is a potential attack vector. You have to control all the input and output on that port, and any flaw there can expose the system itself. But even not having exposed ports isn't safe enough. If they can get access to the circuits themselves, they can harvest…

Contents