Skip to main content

Securing Flash Technology: How Does It Look From Inside?

  • Chapter
ISSE 2008 Securing Electronic Business Processes
  • 450 Accesses

Abstract

In this paper we discuss memories with their basic protection mechanisms and the results of the evaluation of a modern high-density flash memory by an Information Technology Security Evaluation Facility (ITSEF). In a second part, we address the notion of Authenticated Flash and present some authentication methodologies used for existing Flash devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alves, Tiago, Rudelic, J.: ARM Security Solutions and Intel Authenticated Flash. White Paper, 2007. http://www.arm.com/pdfs/Intel_ARM_Security_White_Paper.pdf

    Google Scholar 

  2. Bertoni, Guido: Secure Non-volatile Memory: Is it a New Trend for the Security of Embedded Systems? Presented at the LSEC & IMEC Security Forum 2007. http://www.lsec.be/upload_directories/documents/6STM_Securenonvolatiememory_Bertoni_Guido.pdf

    Google Scholar 

  3. Flash Memory Modules Add Security to Handsets. Electronicstalk, 2007. http://www.electronicstalk.com/news/ssi/ssi125.html

    Google Scholar 

  4. Handschuh, Helena and Trichina, Elena: Securing Flash Technology. In: Breveglieri, L., Gueron, S., Koren, I., Nacccache, D., Seifert, J.-P. (Eds) 4th Int. Workshop on Fault Diagnosis and Tolerance in Cryptography — FDTC 2007. IEEE CSP, 2007, p. 3–17.

    Google Scholar 

  5. Schellekens, Dries, Tuyls, Pim, Preneel, Bart: Embedded Trusted Computing with Authenticated Nonvolatile Memory. In: Lipp, P., Sadeghi, A.-R., and Kock, K.-M. (Eds): TRUST 2008, LNCS 4968, 2008, p.60–74.

    Google Scholar 

  6. Security Features for NOR Flash Memories. AT Microelectronics, 2005. http://www.st.com/flash

    Google Scholar 

  7. Steil, Michael: 17 Mistakes Microsoft Made in Xbox Security. Presented at the 22nd Chaos Communication Congress, Berlin, Germany, 2005. http://www.xbox-linux.org/wiki/17_Mistakes_Microsoft_Made_in-the_Xbox_Security_System

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Handschuh, H., Trichina, E. (2009). Securing Flash Technology: How Does It Look From Inside?. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9283-6_40

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0660-4

  • Online ISBN: 978-3-8348-9283-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics