安全与嵌入式系统-Erik Welsh,德州仪器 DSP 系统安全架构师
Author: Erik Welsh
Author title: DSP Systems Security Architect, Texas Instruments
Security and the embedded system
In February, when Kevin Butler, the marketing facade of Sony™, retweeted,
“@TheKevinButler Lemme guess... you sank my Battleship? RT @exiva: 46 DC …
C2 Come at me, @TheKevinButler,” Sony unwittingly published its
PlayStation3™ master signing key for the world to see and use. Two months
later, we learned developer James Laird reverse-engineered the Apple®
AirPort Express® private key by dumping the read-only memory (ROM)
contents. These are just two examples in a long history of high-profile
security breaches, causing embarrassment and expense to many.
Unfortunately, this begs the question: “If corporate giants like Apple and
Sony can’t protect their……