Главная
Study mode:
on
1
Intro
2
SYSTEM SECURITY ASPECTS
3
Secure System Architecture
4
Security-by-Design SW Components
5
Secure Software? Not in general!
6
APPLICATION HARDENING: LINUX SECURITY FEATURES
7
Application Hardening Linux Security Features
8
APPLICATION HARDENING: HANDS-ON
9
Hands-On: Security Features
10
Application Hardening Hands-On: Connman
11
Hands-On: Bluetooth tethering - Connman & BlueZ
12
APPLICATION HARDENING: CONCLUSION
13
Application Hardening Conclusion
Description:
Explore system application security and reduce exploitation risks through application-specific hardening techniques in this 43-minute conference talk. Delve into the challenges of securing IoT systems and learn preventive measures to enhance security. Discover how to apply exploit mitigations and measures to improve system security, even when dealing with potentially vulnerable applications. Examine the use of discretionary and mandatory access control, as well as systemd configurations, to evaluate and tailor services like connman and blueZ in an APERTIS-based IoT image. Gain insights into service isolation and enhanced exploit mitigation using Linux kernel features. Cover topics such as secure system architecture, security-by-design components, Linux security features, and hands-on application hardening techniques for Connman and Bluetooth tethering.

Reducing Exploitation Risk via Application-Specific Hardening in IoT Systems

Linux Foundation
Add to list