Hardware security elements including TPMs, TEEs and secure elements are available from a variety of vendors. Software security solutions are also available that can provide a variety of features include secure communication, authentication, firewalls, secure boot, secure firmware updates and security management.
This presentation will discuss some recent hacks, cyber security trends, and a detailed overview of IoT security technologies and how they can be applied to secure IoT devices. Specific attention will be paid to the trade-offs and interactions between hardware and software security implementations.
Topics covered include:
- Hardware security: description of TPMs, TEEs, TrustZone and other HW security elements and how they are used in IoT devices
- Software security: Firewalls, encryption, security protocols and secure boot
- Hardware vs. software: the role of HW security versus the role of SW security
- What security features does your IoT device require? What are the minimum requirements?
- Scalability issues: how to address security for sensors, endpoints and gateways
- System level view of security
The ‘Security II – Hacking & attacking’ presentation will take place on 14th March between 4:30-5:00pm.
