Agenda

Filtered by:

Clear All
Date and time to be announced
A Guide to Securing Your IoT Device for TrustZone Using Armv8-M Kobus Marneweck, Arm; Jacob Beningo, Beningo Embedded Group show more Description Securing embedded systems has become a critical task for developers as more devices become connected and upgradable over the Internet. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm® TrustZone® for Cortex®-M processors. We will examine important concepts, such as Secure and Non-secure domains, setting up a TrustZone RTOS and debugging a secure application. This interactive session will provide a hands-on demonstration of the newly released Microchip SAM L11, a Cortex-M23 based chip with TrustZone. We will use Arm Keil MDK to demonstrate how to get TrustZone up and running on both hardware, and also in simulation, using a virtual processor. Topics covered in this session include: – Introduction to TrustZone – Defining the Secure and Non-secure world – Example use cases to secure an application with TrustZone – Implementing an RTOS in the TrustZone environment – How to debug a TrustZone-based application – Best practices for securing an embedded system – Recommendations for next steps Session Type Sponsored Session Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Speakers Kobus Marneweck Arm Jacob Beningo Beningo Embedded Group A More Secure IoT: Fact or Fake News? Ed Sperling, SemiEngineering; Anthony Ambrose, Data I/O Corporation; Haydn Povey, Secure Thingz; Andrew Frame, Arm show more Description In the past year, Arm rolled out its Platform Security Architecture program and has introduced targeted security solutions, such as the Arm Cortex-M35P processor and Arm Musca-A1 test chip board. Multiple stakeholders including silicon vendors, OEMs, and software developers are collaborating to align a fragmented supply chain. But is the IoT more secure today than one year ago? Has the industry actually moved the needle when it comes to more secure IoT? This panel pulls together a range of perspectives to consider the progress made around IoT security and discuss possible areas that Arm and its ecosystem still could address. Session Type Conference Session Pass Type All-Access Pass Speakers Ed Sperling SemiEngineering Anthony Ambrose Data I/O Corporation Haydn Povey Secure Thingz Andrew Frame Arm Advancing IoT Communication Security with TLS and DTLS v1.3 Hannes Tschofenig, Arm Limited show more Description Missing communication security is a common vulnerability in Internet of Things deployments. Addressing this vulnerability is, in theory, relatively easy: with TLS and DTLS, two widely used security protocols are available. They are used to secure web and smart phone apps. In this talk I will explain how the TLS/DTLS 1.3 protocols work and how they differ from previous versions. I will also talk about the performance improvements and how they help in IoT deployments. Session Type Conference Session Pass Type All-Access Pass Speakers Hannes Tschofenig Arm Limited Ensuring Silicon-to-Cloud Security for Your Medical Device Kaushal Vora, Renesas Electronics America Inc. ; Mark Schaeffer, Renesas show more Description While medical devices have always been designed with safety and quality in mind, today’s design emphasis is centered around connected, software-driven medical device security. Security not only impacts safety and quality but also ensures compliance, revenue/IP, and brand protection. In this session, we will discuss a platform approach to security on an Arm-based microcontroller. Here, security starts with securing your firmware, critical data, and keys in the hardware, forming your root-of-trust. We will then discuss how security and trust are extended to your cloud. We also review how designing for security impacts operations, budgets, planning, and insurance/compliance requirements. Session Type Conference Session Pass Type All-Access Pass Speakers Kaushal Vora Renesas Electronics America Inc. Mark Schaeffer Renesas Hack-proofing Your C/C++ Code Greg Davis, Green Hills Software show more Description While 85% of embedded designs use C and C++, these languages are notorious for allowing unsafe code practices that give hackers a way to attack. This talk shows exactly how to keep your Internet-connected product safe by writing your code properly the first time. Well-proven tools and techniques can be used to augment any software-design paradigm, and to effectively hack-proof your code. Techniques include coding conventions, automatic run-time error checking, manual compile-time and run-time assertions, static analysis, and the most common mistakes to avoid. Session Type Conference Session Pass Type All-Access Pass Speakers Greg Davis Green Hills Software Heavyweight Security for a Lightweight, Low-power World Mike Mackey, CENTRI Technology show more Description Everything starts and ends with your data, and taking personal responsibility for its protection is now critical across the industry. Whether you're an expert developing IoT solutions, sensors, or smart devices, you already know implementing IoT security is difficult for resource-constrained embedded environments. Ensuring the data is protected at the first mile, last mile, and every mile between presents a challenge for the true edge across multiple communication protocols. In this session we will look at some of the key challenges involved in securing your IoT data from creation to consumption. Session Type Conference Session Pass Type All-Access Pass Speakers Mike Mackey CENTRI Technology How Security Provisioning Considerations Affect Your Armv8-Mbased Firmware Design Process Rajeev Gulati, Data I/O Corporation; Steve Pancoast , Secure Thingz show more Description Designing a secure device based on an Armv8-M core is one thing. Designing a secure device that can easily be provisioned in high volume is quite another. The latter requires a modern workflow which integrates security into all phases of a product’s life. With a cost-effective and scalable security provisioning methodology, these IoT devices may be produced securely anywhere in the world. Too often there is a gap between the design and manufacturing process, impacting time-to-market and quality. The modern workflow closes the gap between design and production. This session looks at best practices for designing and provisioning trusted devices. Session Type Conference Session Pass Type All-Access Pass Speakers Rajeev Gulati Data I/O Corporation Steve Pancoast Secure Thingz IoT and Silicon Security: Dissecting a Real-life IoT Attack Chowdary Yanamadaa, Arm show more Description Billions of IoT devices are expected to densely populate our cities, homes, offices, and factories. Many of use cases will involve value data and physical proximity – ripe for silicon attacks. IoT attack mitigation has been broadly focused around software counter measures; however, the barrier for physical attacks is increasingly being lowered and silicon security urgently needs protecting. If IoT designers fail to protect all relevant attack vectors, significant data is at risk. In this talk, we will analyze a real-life attack, reviewing the flaws, providing a systematic approach to security and demonstrating how you can now mitigate against silicon vulnerabilities. Session Type Conference Session Pass Type All-Access Pass Speakers Chowdary Yanamadaa Arm Measuring the Performance and Energy Cost of Cryptography in IoT Devices Hannes Tschofenig, Arm Limited; Peter Torelli, EEMBC show more Description Communication security technologies, like Transport Layer Security (TLS), are readily available for developers to use to protect their IoT systems. Still, developers are reluctant to use state-of-the-art security technologies due to the impact on performance, code size and RAM, and energy. What is the impact of encryption algorithms, hash functions, and public key cryptosystems, on a specific microcontroller? In this talk I will introduce a new security benchmark developed by EEMBC that will allow silicon manufacturers and developers to analyze and select the appropriate microcontroller. Session Type Conference Session Pass Type All-Access Pass Speakers Hannes Tschofenig Arm Limited Peter Torelli EEMBC Methods for Provisioning Security Features in an M33-based MCU Using a Physically Unclonable Function Rob Cosaro, NXP show more Description Security is becoming an important part of all devices connected to the Internet, but along with security comes the complication of provisioning the microcontroller with secret keys. In this session, we’ll discuss the traditional methods of injecting secret keys into OTP, but one of the most interesting part of this presentation is the introduction of a new type of key storage called physically unclonable function, or PUF, and what this brings to security. With PUF, the microcontroller contains the key without having to inject a secret key. This opens up different options that make provisioning easier and more secure. Session Type Conference Session Pass Type All-Access Pass Speakers Rob Cosaro NXP Mocana & Arm: Accelerated & Secure Solution Development Srinivas Kumar, Mocana Corporation show more Description Arm TrustZone Platform Security Architecture (PSA) and Mocana TrustCenter and TrustPoint offer a hardened and integration-ready system for compliance with ISO 26262, IEC 62443, NIST 800- 63-3, and IIC Endpoint Security Best Practices. Together, the firmware TPM (fTPM), hardware-based acceleration, firmware isolation levels, and the Trust Abstraction Platform provide APIs for accelerated solution development on Arm-based devices. This joint Mocana/Arm case study will discuss the above framework and how it overcomes the shortcomings of fTPM implementations from the past. Session Type Conference Session Pass Type All-Access Pass Speakers Srinivas Kumar Mocana Corporation Platform Security Architecture: One Year On Rob Coombs, Arm show more Description Last year, at Arm TechCon, we introduced the Arm Platform Security Architecture (PSA), which is designed to provide a framework to reduce the complexity of building secure IoT devices. In 2018, so far, we have published editable IoT threat models, started an open source software project and published the first architecture documents. This presentation will first cover the basics of PSA, what we’ve achieved in the first 12 months, and then new work on APIs and compliance. Session Type Conference Session Pass Type All-Access Pass Speakers Rob Coombs Arm PSA in Practice - Developing with Trustonic on M23 Richard Hayton, Trustonic show more Description Arm’s Cortex-M23 and Cortex-M33, with their Platform Security Architecture, provide the underpinnings for secure IoT. This talk shows how secure devices can be built in practice by leveraging commercial silicon that has been preprovisioned with Trustonic’s secure Kinibi-M micro-TEE and device identity. The talk covers: • Development of a trusted module, with a “hello world” worked example • Debugging and testing of the trusted module on a test board • Deployment steps for a commercial device where debug access is naturally restricted We will also cover some of the key benefits for device makers focusing on IP protection/fraud prevention. Session Type Conference Session Pass Type All-Access Pass Speakers Richard Hayton Trustonic Securing the IoT with Arm TrustZone for the Cortex-M Jacob Beningo, Beningo Embedded Group show more Description Securing embedded systems has become a critical task for developers. It is nearly impossible to turn on the news and not hear about yet another major security breach. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm TrustZone for Cortex-M processors. We will examine important concepts, such as secure and non-secure domains, setting up a TrustZone RTOS, and debugging a secure application. This session will provide a hands-on demonstration, using Nuvoton’s M2351. Session Type Conference Session Pass Type All-Access Pass Speakers Jacob Beningo Beningo Embedded Group Why Arm for Secure IoT Andrew Frame, Arm show more Description For the  IoT market to grow and scale, the ecosystem needs to have confidence that the connected devices they are deploying are designed and built with security in mind. The IoT value chain needs to consider the full spectrum of security considerations, throughout the lifecycle of a device, from security analysis and threat mitigation, through to provisioning and updates. This presentation will review the market challenges and describe how Platform Security Architecture rallies the ecosystem to addresses them. We will show how the combination of Arm services and secure IoT frameworks can ensure the success of evolving IoT business models. Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Speakers Andrew Frame Arm Working together to secure the Internet of Things Andrew Frame, Arm show more Description Securing the Internet of Things is not something that one company or entity can achieve on their own. This panel will discuss how collaboration is required across the whole ecosystem to truly secure devices. The panel will discuss some key collaboration elements including: the Arm Platform Security Architecture (PSA), the creation of firmware and software that adheres to PSA principles, plus the need for accessible and utilizable APIs and professional tools. The panel will represent many areas of the IoT ecosystem including: microcontroller manufacturers, development tools, real-time operating systems, security software solutions and cloud service providers. Session Type Sponsored Session Pass Type All-Access Pass,Arm Mbed Connect Pass,Expo Floor Pass Speakers Andrew Frame Arm
Close Filters
Topic







Session Type



Category
Date


Pass Type


30135 PassType
27253 SecondaryTrack
30821 Date