Design News is part of the Informa Markets Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

7 Tips for Securing an Embedded System

Jacob Beningo, ESC, Embedded Systems Conference, security, hacker, hacking, Flash
With more and more systems starting to connect to the Internet, there are more than a dozen best practices developers should follow to start securing their systems.

Security, just like quality and many other embedded system attributes, must be considered at the start of the development cycle. Developers can’t build their system and then add security at the end. With more and more systems starting to connect to the Internet, there are more than a dozen best practices developers should follow to start securing their systems. Let’s explore several that any team can implement.

Start using ARM Trustzone

ARM Trustzone has been available on application processors for quite some time and it has been announced that ARM Trustzone will be available on new microcontrollers soon. While we may not be able to use Trustzone right now in a microcontroller environment, developers should be starting to explore its implications and how it can be used to write more secure software. If you have an ARM application processor, now is the time to start putting Trustzone to work.

Follow Language and Industry Best Practices

There are several programming language and industry best practices standards that embedded software developers should be using. Using MISRA-C/C++ can ensure that best practices are followed that use a subset of the chosen language. MISRA should be used regardless, but from a security standpoint and if developers are using C, then becoming familiar with and following the best practices in Cert-C is highly recommended. Cert-C is designed to provide recommended coding practices that prevent security vulnerabilities in software.

Digitally Sign and Encrypt Firmware Updates

Any device that is connected to the Internet is going to need feature updates and bug fixes pushed to it. In order to prevent unauthorized firmware updates, developers should consider digitally signing and encrypting their firmware images. Many systems I encounter simply accepts any new software it encounters. Developers should make sure images are authenticated before ever touching them.

Validate the Application at Start-up

Would-be hackers may try to inject new software onto the system during start-up. It’s always a good idea to use the bootloader to validate that the current image stored in ROM and the code running in RAM is what should be there. There are many ways to do this but a very simple check would be to place a CRC that is validated on start-up. It’s better than nothing!

Monitor Stack and Buffer for Overflow

Overflowing the stack or a buffer can be a great way to start injecting malicious code into a system. Developers should monitor their buffers and stack space to ensure they are not able to overflow. This can be done manually by monitoring the position pointer or creating guard zones that warn of an impending overflow. Most RTOSes also include a stack overflow monitor. Make sure that it is not only turned on but that there is code to handle the system when this state occurs.

Lock Flash Space

It certainly is tamper-proof but one extra hurdle to throw in front of a hacker is to lock the Flash program space. Locking the Flash at end-of-line will help prevent someone who has physical access to the device from being able to read out the application code and reverse engineer it. With enough time, they could find a way but the point is that they will have to work harder to get access to the code and that may be enough to discourage them.

Hire a Security Expert

I’m not a security expert (disclaimer), but I will advocate using a security expert to help put a security strategy in place for a device or product. Systems have become so complicated that it is impossible for any single person to be an expert in anything; and if we want to build robust, secure systems, developers need to leverage each other strengths. For small businesses, having a security expert on payroll probably doesn’t make sense but using a consultant or outside company to provide direction when it is required is a great step toward having a secure system.


While most developers, managers, and companies want to ignore security, it is perhaps one of the greatest challenges embedded system developers will face. Let’s be honest -- no one wants to have to pay for or believes that they need to worry about security. We believe that we couldn’t possibly be targeted. I once accidentally put an unprotected Linux machine beyond my firewall so that I could have access to it over the weekend. Out of the billions of machines connected to the Internet, what would be the odds that this machine would be discovered in a few days? Within 24 hours it had been hijacked by some really cool Chinese malware. How long do you think your embedded system will last? 

Join Jacob Beningo at ESC Minneapolis!
Join Jacob Beningo for three can't-miss sessions at ESC Minneapolis, Nov. 8-9, 2017. He will be on-hand live at the Minneapolis Convention Center, where he will be discussing: "Getting Started with Trustzone using Cortex-M Microcontrollers," "Transitioning to RTOS-Based Systems," and "Mastering Real-Time Debugging Techniques on the Cortex-M." Click here to register today

Jacob Beningo is an embedded software consultant who currently works with clients in more than a dozen countries to dramatically transform their businesses by improving product quality, cost and time to market. He has published more than 200 articles on embedded software development techniques, is a sought-after speaker and technical trainer and holds three degrees which include a Masters of Engineering from the University of Michigan. Feel free to contact him at [email protected], at his website, and sign-up for his monthly Embedded Bytes Newsletter.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.