2020 > Free Sessions >

The 1-Hour Security Bootcamp

Shawn Prestridge - IAR Systems - Watch Now - Duration: 49:23

How do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.

italicssurround text with
boldsurround text with
**two asterisks**
or just a bare URL
surround text with
strikethroughsurround text with
~~two tilde characters~~
prefix with

Score: 1 | 1 year ago | 1 reply

Thank you very much for the nice presentation!

Score: 0 | 1 year ago | no reply

Thanks, glad it was informative!

Score: 1 | 2 years ago | 1 reply

Good presentation along with a cool demo! Thanks!

Score: 0 | 1 year ago | no reply

Thank you, glad you enjoyed it!

Score: 2 | 2 years ago | 1 reply

I would like to tank you for this easy to follow and informative presentation. I am fairly new to the security concept in the embedded devices and find this presentation as a good step to start secure developement.

Score: 0 | 2 years ago | no reply

Great, I'm glad it helped you, Faranak!

Score: 1 | 2 years ago | 1 reply

Excellent and informative presentation! Thank you very much!

Score: 0 | 2 years ago | no reply

Thank you, DS! I'm glad you found it helpful!

Score: 1 | 2 years ago | 1 reply

RSA1024 should not be used any more.

Score: 1 | 2 years ago | no reply

I completely agree, MM. As computing hardware gets stronger, RSA becomes more susceptible to various exploits in RSA that make you have to keep upping the key size. This is especially a problem in embedded systems that cannot update their crypto algorithms in the field. ECC has thus far proven fairly resilient to cryptanalysis, so given its smaller key size and lighter-weight algorithm, it's become the go-to crypto system for embedded devices.

Score: 1 | 2 years ago | 1 reply

Really good presentation, very easy to follow and professional.

Score: 0 | 2 years ago | no reply

Thank you so much for your kind words, qbit!