Preface
- Who this book is for
- Who this book is not for
- How this book approaches embedded security
- How to read this book
- A final note
Legal Disclaimer
Chapter 1: The world of embedded systems
- 1.1 What are embedded systems
- 1.2 Definition and core idea
- 1.3 Typical characteristics
- 1.4 Architecture overview
- 1.5 Examples and context
- 1.6 Why they matter
- 1.7 Key takeaways
Chapter 2: Understanding embedded security
- 2.1 What is embedded system cybersecurity?
- 2.2 How embedded security differs from traditional cybersecurity
- 2.3 Key takeaways
Chapter 3: Why embedded systems are hard to secure
- 3.1 Why are embedded systems harder to secure
- 3.2 Why security is critical in embedded systems
- 3.3 Key takeaways
Chapter 4: Threat Landscape in Embedded Systems
- 4.1 Types of adversaries
- 4.2 Attacker capabilities
- 4.3 Typical attack goals
- 4.4 Key takeaways
Chapter 5: Attack surface
- 5.1 Attack surfaces in embedded systems
- 5.2 What is an attack surface?
- 5.3 Hardware attack surface
- 5.4 Software attack surface
- 5.5 Network attack surface
- 5.6 Key takeaways
Chapter 6: Threat modelling in embedded systems
- 6.1 Why threat modeling matters in embedded systems
- 6.2 What a threat model is (and what it is not)
- 6.3 Drawing the Line: System boundaries
- 6.4 The gatekeepers: Trust boundaries