Archive For October, 2011

9 articles

How Security and Safety Regulatory Concerns Impact Public Transportation Industry

By Alexander Damisch In my last blog, I discussed the changing mass transit landscape and the shift to commercial-off-the-shelf (COTS) technologies to meet the industry’s changing demands. In addition to price sensitivities and system complexities facing manufacturers, changes in security regulations, unknown safety and security threats, and an increasing amount of electronic systems with the potential for exposure to safety…

Improving Embedded Security: Proper Runtime Selection

By Bill Graham Selection of secure components for an embedded system is key to a secure system. Leveraging a secure RTOS, middleware, virtualization and tools significantly reduces the effort and development costs. Moreover, there are additional benefits from using commercial-off-the-shelf (COTS) software components over Roll Your Own (RYO) code or self-ported and maintained open source code. Some of the COTS…

Achieving Seamless Connectivity and Compliance for Mobile Healthcare

By Santhosh Nair For the makers of medical devices used in mobile healthcare, connectivity is becoming increasingly critical. Devices are becoming more intelligent and controlling more and more aspects of patient care, clinical diagnostics, and hospital administration. And they are interacting not just with people—expanding our ability to communicate and share information—but also with each other. They control systems that…

Improving Embedded Security: Leverage Advanced Security Design

By Bill Graham Trying to address a long list of security requirements for a device on a case-by-case basis is time consuming, costly and frankly not the best way to approach the problem. Two important architectural approaches to consider are separation of concerns and component reuse. Separation of concerns means separating out significant portions of a system into separate subsystems…

Importance of the M2M Ecosystem

By Jens Wiegand Today I participated in a great panel discussion with Intel, Kontron and Eurotech on the Peggy Smedley show.  The underlying theme of the discussion was around the importance of the M2M ecosystem and collaborating with partners. Building device centric solutions combines four key vectors. The first is silicon, second is the hardware, third is the middleware and…

Why Simics Won’t Run Super Mario

By Jakob Engblom Emulating old computer gaming systems is a popular consumer-market application of simulation technology similar to Wind River Simics. There are a large number of emulators out there, emulating everything from old arcade games to the home computers of the 1980's to gaming consoles.  These emulators might seem quite similar to Simics on the surface, but in practice,…

Unmanned Systems: More Reports of Security Vulnerabilities

By Joe Wlad By now, you’ve likely heard the latest report of security holes in unmanned ground control systems. This time, a key-logging virus has been found on one or more hard drives at the Nevada operations center for the Predator and Reaper unmanned vehicles. While the investigation is ongoing and impact of the virus is determined, the real concern…

The State of Modern Nomadic Life

By Alexander Damisch Public transportation is undergoing tremendous transformation at the moment. The reasons for this revolution are varied. Mass transit has never been more important around the world as the urban areas of highly developed countries are unable to handle further unlimited growth of private transportation. Emerging countries with a 100-year backlog in public transport infrastructure development face the…

Five Steps to Improving Embedded System Security

By Bill Graham Embedded device security needs to be integrated into the development lifecycle of the product rather than being an afterthought. The following are high level guidelines that embedded systems designers should consider when addressing security. This is not a prescriptive methodology, but intended to highlight an approach that looks at embedded security as a development lifecycle issue from…