Development and production processes for secure embedded control devices

Tobias Rauter*, Andrea Höller, Johannes Iber, Christian Josef Kreiner

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung


Security is a vital property of SCADA systems, especially in the context of critical infrastructure. In this work, we focus on distributed control devices for hydro-electric power plants. Much work has been done for specific lifecylce phases of distributed control devices such as development or operational phase. Our aim here is to consider the entire product lifecycle and the consequences of security feature implementations for a single lifecycle stage on other stages. In particular, we discuss the security concept used to secure our control devices in the operational stage and show how these concepts result in additional requirements for the development and production stages.We show how we meet these requirements and focus on a production process that enables the commissioning of secrets such as private keys during the manufacturing phase. We show that this can be done both, securely and with acceptable overhead even when the manufacturing process is handled by a contract manufacturer that is not under full control of the OEM.

TitelSystems, Software and Services Process Improvement - 23rd European Conference, EuroSPI 2016, Proceedings
Herausgeber (Verlag)Springer International Publishing AG
ISBN (Print)9783319448169
PublikationsstatusVeröffentlicht - 2016
Veranstaltung23rd European Conference on Systems, Software and Services Process Improvement: EuroSPI 2016 - Graz, Österreich
Dauer: 14 Sep. 201616 Sep. 2016


NameCommunications in Computer and Information Science
ISSN (Print)18650929


Konferenz23rd European Conference on Systems, Software and Services Process Improvement

ASJC Scopus subject areas

  • Informatik (insg.)


Untersuchen Sie die Forschungsthemen von „Development and production processes for secure embedded control devices“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren