Trusted Objects publishes a Position Paper on Software & IP Protection for OEM
Trusted Objects, an expert in cybersecurity for the Industrial Internet of Things, has just published a Position Paper on the protection of OEM's software code against security breaches, covering vulnerabilities and innovative solutions to fix these vulnerabilities.
AIX EN PROVENCE, France, May 13, 2020 /PRNewswire-PRWeb/ -- The purpose of this position paper is to analyze the vulnerabilities leading to software & IP hacking and theft, to look at the different solutions and their gaps and to finally introduce a new concept adapted to embedded systems.
Trusted Objects Position Paper "Software & IP Protection for OEM" analyzes the vulnerabilities that are often encountered during the device manufacturing process, on the off-the-shelf device and during the OTA (Over The Air) software update. The document then explores the different security technologies have been deployed for decades to protect data and software, including state-of-the art cryptography, digital signature, secure boot, obfuscation of executables. However, these existing security solutions have led to identifying some gaps for embedded systems.
The Position Paper concludes with the new concepts identified for software and IP protection, bringing a seamless protection all along the "chain of trust." Secure libraries based on cryptography and obfuscation techniques have proven to be efficient against reverse engineering, and easy to implement. Centralized solutions for secure programming are getting user friendly and easy to implement, at effective cost.
Trusted Objects has pioneered new concepts and innovative solutions for software & IP protection, including secure libraries, secure programming and secure boot for OTA secure software update. Trusted Objects has also partnered with System General to have TOPS, its secure programming solution, qualified on System General programming equipment.
The Position Paper "Software & IP Protection for OEM" is available from Trusted Objects website.
About Trusted Objects
Trusted Objects is a leading independent player in the Secure IoT market, providing innovative solutions including software and embedded firmware, to dramatically enhance the security of connected devices. Trusted Objects solutions are fully optimized, certified and are positioned as the root of trust to meet the end to end security needs of the IoT.
Trusted Objects also delivers a set of services and systems including security assessment, personalization engine, keys and certificates management, fast prototyping to accelerate the deployment of comprehensive solutions that meet the highest security requirements.
SOURCE Trusted Objects
Share this article