Improving Embedded Security: Proper Runtime Selection

By Bill Graham

Bill GrahamSelection of secure components for an embedded system is key to a secure system. Leveraging a secure RTOS, middleware, virtualization and tools significantly reduces the effort and development costs. Moreover, there are additional benefits from using commercial-off-the-shelf (COTS) software components over Roll Your Own (RYO) code or self-ported and maintained open source code. Some of the COTS components worth considering include:

Continue reading >>

Tweet about this on TwitterShare on Google+Share on FacebookShare on LinkedInEmail this to someone