Maury Wright over at the Intel Embedded Community site looks at a security methodology for protecting Internet-connected embedded systems.
The methodology, developed by Intel and Kontron, considers three scenarios:
- The connection of legacy systems to the Internet
- The need for a secure boot chain
- Highly-secure applications requiring separate security and application OSs
The blog post includes related links, including one to a white paper describing the research.