Главная
Study mode:
on
1
Introduction
2
Who am I
3
Storytime
4
What happened
5
The problem definition
6
What does trust mean
7
What does it mean to fail safely
8
How do you build your system
9
Secure Boot
10
Chain of Trust
11
Change of Trust
12
DM Verity
13
Miracle Tree
14
Verity
15
Full Disk Encryption
16
System Setup
17
Encryption
18
Encryption Example
19
Trust Zone
20
Keyblob
21
Hubble Model
22
Advanced System Setup
23
Integrity Measurement Architecture
24
EVM
Description:
Explore a comprehensive conference talk on securing Linux-based embedded systems against various cyber threats. Learn about essential security mechanisms like DM-Crypt, DM-Verity, Secure Boot, TEE sub-system, FScrypt, and IMA. Discover practical strategies for integrating these mechanisms into diverse embedded systems, including mobile phones, tablets, network-attached DVRs, routers, and IoT hubs, while optimizing limited hardware resources. Gain insights from Gilad Ben-Yossef, a principal software engineer at Arm, as he delves into topics such as trust, fail-safe systems, chain of trust, full disk encryption, Trust Zone, and the Integrity Measurement Architecture. Enhance your understanding of building resilient Linux-based systems to protect against nefarious attacks in the ever-evolving landscape of cybersecurity.

Protecting Your System from Security Threats - Linux Security Mechanisms

Linux Foundation
Add to list
0:00 / 0:00