Designing secure loT devices with the arm platform securiity architecture and cortex-M33 / (Record no. 43801)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04947nam a22002295a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20241028160445.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230718s2022 maua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128214695 |
041 ## - LANGUAGE CODE | |
Language | English |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.678 |
Item number | MAR |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Martin, Trevor, |
245 10 - TITLE STATEMENT | |
Title | Designing secure loT devices with the arm platform securiity architecture and cortex-M33 / |
Statement of responsibility, etc | Trevor Martin. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Oxford : |
Name of publisher, distributor, etc | Newnes, |
Date of publication, distribution, etc | 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xv, 480 pages : |
Other physical details | illustrations ; |
Dimensions | 25 cm |
505 ## - FORMATTED CONTENTS NOTE | |
Title | Cover image<br/>Title page<br/>Table of Contents<br/>Copyright<br/>Foreword<br/>Chapter 1: Introduction<br/>Abstract<br/>Arm Platform Security Architecture<br/>Assumptions<br/>Structure of the book<br/>Tutorial exercises<br/>Important<br/>Chapter 2: Arm platform security architecture<br/>Abstract<br/>Introduction<br/>Analyze<br/>Architect<br/>Implement<br/>PSA certification<br/>Conclusion<br/>Chapter 3: Development tools and device platform<br/>Abstract<br/>Introduction<br/>Hardware<br/>Software<br/>< to do > Install community license<br/>Conclusion<br/>Chapter 4: Cryptography—The basics<br/>Abstract<br/>Introduction<br/>mbedTLS<br/>Information assurance<br/>Security services<br/>Ciphers<br/>Streaming block ciphers<br/>Hash functions<br/>Authenticated encryption<br/>Random numbers<br/>Managing keys<br/>Conclusion<br/>Chapter 5: Cryptography—Secure communications<br/>Abstract<br/>Introduction<br/>Asymmetric ciphers<br/>Elliptic curve cryptography<br/>Message signing<br/>Using asymmetrical ciphers<br/>Man in the Middle<br/>Public key infrastructure<br/>X.509 certificates<br/>Certificate validation<br/>Certificate lifetime<br/>Certificate revocation list<br/>Certificate encoding<br/>Certificate authority selection<br/>Certificate chain<br/>Exercise: Creating X.509 certificates<br/>Putting it all together<br/>Exercise: TLS server authentication<br/>Conclusion<br/>Chapter 6: IoT networking and data formats<br/>Abstract<br/>Introduction<br/>Message queued telemetry transport (MQTT)<br/>Data formats<br/>Conclusion<br/>Chapter 7: Using an IoT cloud service<br/>Abstract<br/>Introduction<br/>AWS account<br/>AWS IoT<br/>Connect a device<br/>Create a connection policy<br/>Adding the Dynamo DB database<br/>Action rules<br/>IoT analytics<br/>Logs<br/>Lambda<br/>Device services<br/>Conclusion<br/>Chapter 8: Software attacks and threat modeling<br/>Abstract<br/>Introduction<br/>Common security exploits and vulnerabilities<br/>Mitigation<br/>Threat modeling<br/>Conclusion<br/>Chapter 9: Building a defense with the PSA security model<br/>Abstract<br/>Introduction<br/>Software architecture<br/>Temporal barrier<br/>Runtime isolation<br/>PSA Execution environment<br/>Runtime partitions<br/>Secure services<br/>Secure Boot<br/>PSA parameters<br/>Lifecycle<br/>Device requirements<br/>Conclusion<br/>Chapter 10: Device partitioning with TrustZone<br/>Abstract<br/>Introduction<br/>TrustZone security extension<br/>Programmers model<br/>TrustZone operation<br/>TrustZone configuration<br/>TrustZone interrupt handling<br/>TrustZone system control block<br/>SysTick<br/>Exercise: TrustZone SysTick support<br/>Using an RTOS with TrustZone<br/>Memory protection unit (MPU)<br/>CMSIS-zone<br/>Conclusion<br/>Chapter 11: The NXP LPC55S69 a reference IoT microcontroller<br/>Abstract<br/>Introduction<br/>Trusted execution environment (TEE)<br/>Security architecture<br/>Hardware accelerators<br/>Conclusion<br/>Chapter 12: Trusted firmware<br/>Abstract<br/>Introduction<br/>Installation<br/>Exercise: TF-M setup and testing<br/>TF-M software design<br/>Conclusion<br/>Chapter 13: Trusted firmware secure services<br/>Abstract<br/>Introduction<br/>Nonsecure client<br/>Security services<br/>Conclusion<br/>Chapter 14: The PSA Secure Bootloader<br/>Abstract<br/>Introduction<br/>Updatable bootloader<br/>Upgrade strategies<br/>Firmware update service<br/>Image encapsulation<br/>Image signing<br/>BL2 configuration<br/>Updating the bootloader keys<br/>Exercise: Bootloader keys<br/>Bootloading by hardware key<br/>Image encryption<br/>Measured boot<br/>Conclusion<br/>Bibliography<br/>Index |
520 ## - SUMMARY, ETC. | |
Summary, etc | Designing Secure IoT devices with the Arm Platform Security Architecture and Cortex-M33 explains how to design and deploy secure IoT devices based on the Cortex-M23/M33 processor. The book is split into three parts. First, it introduces the Cortex-M33 and its architectural design and major processor peripherals. Second, it shows how to design secure software and secure communications to minimize the threat of both hardware and software hacking. And finally, it examines common IoT cloud systems and how to design and deploy a fleet of IoT devices. Example projects are provided for the Keil MDK-ARM and NXP LPCXpresso tool chains.<br/><br/>Since their inception, microcontrollers have been designed as functional devices with a CPU, memory and peripherals that can be programmed to accomplish a huge range of tasks. With the growth of internet connected devices and the Internet of Things (IoT), “plain old microcontrollers” are no longer suitable as they lack the features necessary to create both a secure and functional device. The recent development by ARM of the Cortex M23 and M33 architecture is intended for today’s IoT world. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | General Books |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
a | 0 |
b | ibc |
c | orignew |
d | 2 |
e | ncip |
f | 20 |
g | y-gencatlg |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Location | Shelving location | Date of Cataloging | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Non-fiction | CUTN Central Library | CUTN Central Library | Generalia | 28/10/2024 | 004.678 MAR | 50388 | 28/10/2024 | 28/10/2024 | General Books |