This comprehensive introduction describes embedded systems for smart appliances and energy management. The text combines a multidisciplinary blend of topics from embedded systems, information technology and power engineering.Even though they use best practises like defence in depth (layering several redundant security mechanisms on top of each other), physical tamper ... Perhaps the most striking example, in 2010 a hacker group managed to calculate the root signing key at the top of the chain of trust for the Sony Playstation 3. ... vulnerabilities in medical implants, such as pacemakers, that can be wirelessly parameterised.
|Title||:||Embedded Systems for Smart Appliances and Energy Management|
|Author||:||Christoph Grimm, Stefan Mahlknecht, Peter Neumann|
|Publisher||:||Springer Science & Business Media - 2012-05-31|