most of the common devices are `smart', i.e., they host
embedded systems. Also increasinglythey are having some
way to connect to the outside world. While this makes
it extremely convenient forthe user, it also exponentially
increases the possiblity of an attack which can bring
the entire system down. Hence it is extremely important
to learn how to design secure embedded systems. This
course looks atvarious security aws that embedded systems
might have and design practices for avoiding them.
Hu, Security and Privacy in Internet of Things, CRC
2. David Kleidermacher, Mike Kleidermacher Embedded
Systems Security, Elsevier 2012.
3. Robert C. Seacord Secure Coding in C and C++, 2nd
Edition, Pearson Education, 2014.
4. Timothy Stapko Practical Embedded Security, Elsevier,
5. Nikolay Elenkov Android Security Internals, No Starch