Главная
Study mode:
on
1
Embedded Linux Conference North America 2020
2
INTRODUCTION TO SECURITY
3
SECURITY CONCEPTS III
4
THREAT MODELING
5
STRIDE
6
DREAD
7
THREAT MODEL EXAMPLE
8
SECURE BOOT CONCEPTS
9
HOW DOES IT WORK?
10
SECURE BOOT ON i.MX6
11
CODE AND DATA ENCRYPTION
12
SECURE BOOT WITH ENCRYPTION
13
WHERE IS THE KEY?
14
PRIVATE KEY STORAGE
15
KEY STORAGE ON .MX PROCESSORS
16
KEY STORAGE ON EXTERNAL DEVICES
17
SECURE ELEMENT
18
SECURE CODING
19
STATIC CODE ANALYSIS
20
RUNTIME PROTECTIONS
21
FUZZING TOOLS
22
PERMISSIONS
23
ACCESS CONTROL
24
LINUX CAPABILITIES
25
DAC vs MAC
26
LINUX SECURITY MODULES
27
APPLICATION SANDBOXING
28
LINUX CONTAINERS
29
CONTAINERS AND SECURITY
30
TEE IMPLEMENTATION
31
UPDATE SYSTEM AND SECURITY
32
UPDATE CHALLENGES
33
UPDATE STRATEGIES
34
NETWORK SECURITY
35
DEFENSE IN DEPTH!
36
SECURITY GENERAL RULES
37
DESIGN FOR SECURITY
Description:
Explore embedded Linux security fundamentals in this comprehensive conference talk from Embedded Linux Conference North America 2020. Delve into essential security concepts, threat modeling techniques like STRIDE and DREAD, and practical threat model examples. Learn about secure boot concepts, their implementation on i.MX6 processors, and the intricacies of code and data encryption. Discover various methods for private key storage, including secure elements and external devices. Gain insights into secure coding practices, static code analysis, runtime protections, and fuzzing tools. Examine Linux security features such as permissions, access control, capabilities, and security modules. Investigate application sandboxing, Linux containers, and their security implications. Understand Trusted Execution Environment (TEE) implementations, update system security challenges, and strategies. Explore network security principles and the concept of defense in depth. Conclude with general security rules and best practices for designing secure embedded Linux systems. Read more

Introduction to Embedded Linux Security

Linux Foundation
Add to list
0:00 / 0:00