|
Trusted Objects publishes a Position Paper on Software & IP Protection for OEM
Thursday, May 21, 2020
Trusted Objects, an expert in cybersecurity for the Industrial Internet of Things, has just published a Position Paper on the protection of OEM's software code against security breaches, covering vulnerabilities and innovative solutions to fix these vulnerabilities.
AIX EN PROVENCE, France, May 13, 2020 /PRNewswire-PRWeb/ -- The purpose of this position paper is to analyze the vulnerabilities leading to software & IP hacking and theft, to look at the different solutions and their gaps and to finally introduce a new concept adapted to embedded systems.
Trusted Objects Position Paper "Software & IP Protection for OEM" analyzes the vulnerabilities that are often encountered during the device manufacturing process, on the off-the-shelf device and during the OTA (Over The Air) software update. The document then explores the different security technologies have been deployed for decades to protect data and software, including state-of-the art cryptography, digital signature, secure boot, obfuscation of executables. However, these existing security solutions have led to identifying some gaps for embedded systems.
The Position Paper concludes with the new concepts identified for software and IP protection, bringing a seamless protection all along the "chain of trust." Secure libraries based on cryptography and obfuscation techniques have proven to be efficient against reverse engineering, and easy to implement. Centralized solutions for secure programming are getting user friendly and easy to implement, at effective cost.
Trusted Objects has pioneered new concepts and innovative solutions for software & IP protection, including secure libraries, secure programming and secure boot for OTA secure software update. Trusted Objects has also partnered with System General to have TOPS, its secure programming solution, qualified on System General programming equipment.
The Position Paper "Software & IP Protection for OEM" is available from Trusted Objects website.
About Trusted Objects
Trusted Objects is a leading independent player in the Secure IoT market, providing innovative solutions including software and embedded firmware, to dramatically enhance the security of connected devices. Trusted Objects solutions are fully optimized, certified and are positioned as the root of trust to meet the end to end security needs of the IoT.
Trusted Objects also delivers a set of services and systems including security assessment, personalization engine, keys and certificates management, fast prototyping to accelerate the deployment of comprehensive solutions that meet the highest security requirements.
SOURCE Trusted Objects
|
|
|
|
|
 |
Identiv Completes Thailand Manufacturing Transition, Unlocking Next-Generation Multicomponent Manufacturing for Advanced IoT Solutions | Jan 22, 2026
|
 |
Global Cyber Alliance Identifies Five Cybersecurity Forces That Defined 2025 - And Will Shape 2026 | Jan 22, 2026
|
 |
Truvista Fiber Acquires SlyTel | Jan 22, 2026
|
 |
New Report Names States Most Vulnerable to Holiday Scams | Jan 22, 2026
|
 |
Android Mobile Adware Surges in Second Half of 2025 | Jan 22, 2026
|
 |
Healthcare Industry Executives are Likely to be Personal Targets of Cybercrime | Jan 22, 2026
|
 |
pgEdge Announces pgEdge Agentic AI Toolkit for Postgres | Jan 22, 2026
|
 |
Guardz 2025 SMB Cybersecurity Report: Nearly 50% of U.S. Small Businesses Have Been Hit by Cyber Attack | Jan 22, 2026
|
 |
Breakthrough Progress: METiS TechBio Publishes Consecutive Research Findings in Nature Communications and the Journal for ImmunoTherapy of Cancer | Jan 22, 2026
|
 |
LG ELECTRONICS INTRODUCES 2026 LG GRAM LINEUP ELEVATED BY AEROMINUM | Jan 22, 2026
|
|
|
|