Securing Telemetry Post Processing Applications with Hardware Based Security
Author
Kalibjian, JeffAffiliation
Hewlett Packard CorporationIssue Date
2004-10Keywords
Hardware Security Modules (HSM)Hardware Security Module Hybrids (HSMH)
Federal Processing Information Standard 140-2 (FIPS 140-2)
Common Criteria (CC)
security boundary
key management
Metadata
Show full item recordRights
Copyright © International Foundation for TelemeteringCollection Information
Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.Abstract
The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.Sponsors
International Foundation for TelemeteringISSN
0884-51230074-9079