Evolution of Embedded Platform Security Technologies: Past, Present & Future Challenges

Research output: Chapter in Book/Report/Conference proceedingConference contribution


In recent years, the proliferation of intelligent em- bedded technologies is opening venues to new service and com- puting models, providing diverse socio-economic benefits. These intelligent technologies are giving rise to a wide range of public and private applications by sharing and analysing generated data. This includes smart home, smart health, smart city, autonomous vehicles, smart grid and smart manufacturing etc. However, where this sharing of data brings benefits and opportunities, it simultaneously presents security risks and challenges. The realisation and prototyping of such technologies require a computing hardware widely available in the form of an embedded platform. The security perimeter and the attack surface of these platforms rely on their supported security and defence mechanisms. This paper aims to build a body-of-knowledge in this area for the security research community. It present the state-of-the-art security frameworks and architectures, discuss architectural shortcomings and root-causes of leading security technologies rather than discussing vulnerabilities and attacks. The paper concludes advocating secure-by-design platform approach and classifying platform security methods to realise robust embedded platform security architecture.
Original languageEnglish
Title of host publicationIEEE Conference on System-on-Chip: Proceedings
Publication statusAccepted - 01 Jul 2020
EventIEEE Conference on System-on-Chip - Virtual
Duration: 08 Sep 202011 Sep 2020
Conference number: 33

Publication series

NameIEEE International System-on-Chip Conference: Proceedings
ISSN (Print)2164-1676
ISSN (Electronic)2164-1706


ConferenceIEEE Conference on System-on-Chip
Abbreviated titleSoCC
Internet address

Fingerprint Dive into the research topics of 'Evolution of Embedded Platform Security Technologies: Past, Present & Future Challenges'. Together they form a unique fingerprint.

Cite this