Home > Tracks > Embedded Systems Security

The 1-Hour Security Bootcamp

Shawn Prestridge - IAR Systems - Watch Now

How do you keep your company from being front page news for the wrong reasons? You can start by implementing a rigorous security solution on your embedded devices. The most common reason developers give for not using security is that they perceive it to be too hard, so they will just sit back until they are forced to imbue their devices with security by either their customers or the government... or until they get hacked and shamed. Good security is hard, but with the right tools, it doesn't have to be that way. In this session, we're going to take a holistic approach to implementing security by examining the Chain of Trust, hardware requirements, and working in a secure workflow to minimize the attack surface a hacker can use to attack your system. We're going to show you how easy it can be to enable a high degree of security in just a few easy steps.

M↓ MARKDOWN HELP
italicssurround text with
*asterisks*
boldsurround text with
**two asterisks**
hyperlink
[hyperlink](https://example.com)
or just a bare URL
code
surround text with
`backticks`
strikethroughsurround text with
~~two tilde characters~~
quote
prefix with
>

Doini
Score: 1 | 4 days ago | 1 reply

Thank you very much for the nice presentation!

ShawnSpeaker
Score: 0 | 4 days ago | no reply

Thanks, glad it was informative!

Nazmul
Score: 1 | 1 month ago | 1 reply

Good presentation along with a cool demo! Thanks!

ShawnSpeaker
Score: 0 | 4 days ago | no reply

Thank you, glad you enjoyed it!

Faranak
Score: 2 | 2 months ago | 1 reply

I would like to tank you for this easy to follow and informative presentation. I am fairly new to the security concept in the embedded devices and find this presentation as a good step to start secure developement.

ShawnSpeaker
Score: 0 | 2 months ago | no reply

Great, I'm glad it helped you, Faranak!

DS
Score: 1 | 2 months ago | 1 reply

Excellent and informative presentation! Thank you very much!

ShawnSpeaker
Score: 0 | 2 months ago | no reply

Thank you, DS! I'm glad you found it helpful!

MM
Score: 1 | 2 months ago | 1 reply

RSA1024 should not be used any more.

ShawnSpeaker
Score: 1 | 2 months ago | no reply

I completely agree, MM. As computing hardware gets stronger, RSA becomes more susceptible to various exploits in RSA that make you have to keep upping the key size. This is especially a problem in embedded systems that cannot update their crypto algorithms in the field. ECC has thus far proven fairly resilient to cryptanalysis, so given its smaller key size and lighter-weight algorithm, it's become the go-to crypto system for embedded devices.

qbit
Score: 1 | 2 months ago | 1 reply

Really good presentation, very easy to follow and professional.

ShawnSpeaker
Score: 0 | 2 months ago | no reply

Thank you so much for your kind words, qbit!

OUR SPONSORS