Chapter 12
Hardware and Security: Vulnerabilities and Solutions
Gedare Bloom, Eugen Leontie, Bhagirath Narahari and Rahul Simha
12.1 Introduction
This chapter introduces the role that computer hardware plays for attack and defense in cyber-physical systems. Hardware security – whether for attack or defense – differs from software, network, and data security because of the nature of hardware. Often, hardware design and manufacturing occur before or during software development, and as a result, we must consider hardware security early in product life cycles. Yet, hardware executes the software that controls a cyber-physical system, so hardware is the last line of defense before damage is done – if an attacker compromises hardware then software ...
Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.