- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 258字
- 2021-06-10 18:42:21
Real-time operating systems
IoT devices often employ a Real-Time Operating System (RTOS) for process and memory management, as well as utility services supporting messaging and other communications. The selection of each RTOS is based on needed performance, security, and functional requirements of the product. There are many RTOS available, including those noted here:

Many IoT device profiles are shrinking to small but powerful SoC units, capable of running a variety of secured-boot operating systems, featuring strict access controls, process isolation, trusted execution environments, kernel separation, information flow control, and tightly integrated cryptographic security architectures. Safety-critical IoT devices employ RTOS that meet industry-specific standards. Examples of these include the following:
- DO-178B: Software considerations in airborne systems and equipment certification for avionics systems
- IEC 61508: Functional safety for industrial control systems
- ISO 62304: Medical device software
- SIL3/SIL4: Safety integrity level for transportation and nuclear systems
Other critical security attributes pertain to security configuration and the storage of security sensitive parameters. Often configuration settings that are applied to an operating system are lost upon power cycle without battery-backed RAM or some other persistent storage. In many instances, a configuration file is kept within persistent memory to provide the various network and other settings necessary to allow the device to perform its functions and communicate. Of even greater interest are the handling of the root password, other account passwords, and the cryptographic keys stored on the devices when the device is power-cycled. Each of these issues has one or more security implications and requires the attention of security engineers.
- 特種木馬防御與檢測技術(shù)研究
- 開發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- 數(shù)字安全藍(lán)皮書:本質(zhì)屬性與重要特征
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- 從0到1:CTFer成長之路
- 從實(shí)踐中學(xué)習(xí)Kali Linux滲透測試
- 安全防御入門手冊
- Mastering Reverse Engineering
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- 功能型密碼算法設(shè)計(jì)與分析
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 聯(lián)邦學(xué)習(xí)原理與算法
- Manga Studio 5 Beginner's Guide
- CTF網(wǎng)絡(luò)安全競賽入門教程
- Blockchain Development with Hyperledger