Главная
Study mode:
on
1
Introduction
2
Whats the big deal
3
Our industry has a superpower
4
Different dimensions to security
5
Building blocks of security
6
Root Certificate Authority
7
Mutual TLS
8
Asymmetric Encryption
9
Elliptical Curves
10
HS Systems
11
The Bad News
12
Security in General
13
Additional Layers
14
Good Practices
15
Trusted Execution Environment
16
Questions
17
NXP
18
Summary
19
AWS IoT
20
Key Rolling
21
OS
Description:
Explore a comprehensive conference talk on secure embedded development practices. Gain insights into the industry's superpower and various dimensions of security. Delve into essential building blocks including Root Certificate Authority, Mutual TLS, Asymmetric Encryption, and Elliptical Curves. Examine HS Systems and the challenges in security implementation. Learn about additional security layers, good practices, and the importance of Trusted Execution Environment. Discover key concepts related to NXP, AWS IoT, and key rolling in operating systems. Equip yourself with a secure mindset for embedded development through this informative 43-minute presentation by Andy Doan and Ricardo Salveti from Foundries.io, hosted by the Linux Foundation.

Shhh - Stop Sharing Secrets: A Secure Mindset for Embedded Development

Linux Foundation
Add to list
0:00 / 0:00