toggle navigation
Home
Registration
Travel Info
Agenda
Expo Floor
Exhibit & Sponsor
Agenda
Sessions
|
Speakers
Go
Filtered by:
Clear All
Tuesday, October 16
9:00am
Heavyweight Security for a Lightweight, Low-power World
9:00AM - 9:50AM
William Adams, CENTRI Technology
show more
Description
Everything starts and ends with your data, and taking personal responsibility for its protection is now critical across the industry. Whether you're an expert developing IoT solutions, sensors, or smart devices, you already know implementing IoT security is difficult for resource-constrained embedded environments. Ensuring the data is protected at the first mile, last mile, and every mile between presents a challenge for the true edge across multiple communication protocols. In this session we will look at some of the key challenges involved in securing your IoT data from creation to consumption.
Time
Tuesday, Oct 16 9:00AM - 9:50AM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210E
Speakers
William Adams
CENTRI Technology
1:30pm
Optimizing threat modeling to create robust IoT security solutions
1:30PM - 2:20PM
Suresh Marisetty, Arm
show more
Description
The expected growth of IoT devices will be fuelled by a myriad of use cases, including surveillance cameras, smart meters and asset trackers. These use cases each have power, performance and area (PPA) constraints and more importantly, the need for robust security. Threat Modeling and Security Analysis is a systematic approach, which helps to architect security requirements, optimized for a specific use case. These requirements needs to be mapped to a design that operates within the desired PPA constraints. This presentation will walk you through threat modeling and how Arm’s Platform Security Architecture can help make robust IoT security solutions.
Time
Tuesday, Oct 16 1:30PM - 2:20PM
Session Type
Sponsored Session
Location
Executive Ballroom 210E
Speakers
Suresh Marisetty
Arm
2:30pm
Hack-proofing Your C/C++ Code
2:30PM - 3:20PM
Greg Davis, Green Hills Software
show more
Description
While 85% of embedded designs use C and C++, these languages are notorious for allowing unsafe code practices that give hackers a way to attack. This talk shows exactly how to keep your Internet-connected product safe by writing your code properly the first time. Well-proven tools and techniques can be used to augment any software-design paradigm, and to effectively hack-proof your code. Techniques include coding conventions, automatic run-time error checking, manual compile-time and run-time assertions, static analysis, and the most common mistakes to avoid.
Time
Tuesday, Oct 16 2:30PM - 3:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210E
Speakers
Greg Davis
Green Hills Software
IoT and Silicon Security: Dissecting a Real-life IoT Attack
2:30PM - 3:20PM
Chowdary Yanamadala, Arm
show more
Description
Billions of IoT devices are expected to densely populate our cities, homes, offices, and factories. Many of use cases will involve value data and physical proximity – ripe for silicon attacks. IoT attack mitigation has been broadly focused around software counter measures; however, the barrier for physical attacks is increasingly being lowered and silicon security urgently needs protecting. If IoT designers fail to protect all relevant attack vectors, significant data is at risk. In this talk, we will analyze a real-life attack, reviewing the flaws, providing a systematic approach to security and demonstrating how you can now mitigate against silicon vulnerabilities.
Time
Tuesday, Oct 16 2:30PM - 3:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210H
Speakers
Chowdary Yanamadala
Arm
3:30pm
Mocana & Arm: Accelerated & Secure Solution Development
3:30PM - 4:20PM
Srinivas Kumar, Mocana
show more
Description
Arm TrustZone Platform Security Architecture (PSA) and Mocana TrustCenter and TrustPoint offer a hardened and integration-ready system for compliance with ISO 26262, IEC 62443, NIST 800- 63-3, and IIC Endpoint Security Best Practices. Together, the firmware TPM (fTPM), hardware-based acceleration, firmware isolation levels, and the Trust Abstraction Platform provide APIs for accelerated solution development on Arm-based devices. This joint Mocana/Arm case study will discuss the above framework and how it overcomes the shortcomings of fTPM implementations from the past.
Time
Tuesday, Oct 16 3:30PM - 4:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210F
Speakers
Srinivas Kumar
Mocana
4:30pm
Platform Security Architecture: One Year On
4:30PM - 5:20PM
Robert Coombs, Arm
show more
Description
Last year, at Arm TechCon, we introduced the Arm Platform Security Architecture (PSA), which is designed to provide a framework to reduce the complexity of building secure IoT devices. In 2018, so far, we have published editable IoT threat models, started an open source software project and published the first architecture documents. This presentation will first cover the basics of PSA, what we’ve achieved in the first 12 months, and then new work on APIs and compliance.
Time
Tuesday, Oct 16 4:30PM - 5:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210H
Speakers
Robert Coombs
Arm
Wednesday, October 17
9:00am
Securing the IoT with Arm TrustZone for the Cortex-M
9:00AM - 9:50AM
Jacob Beningo, Beningo Embedded Group
show more
Description
Securing embedded systems has become a critical task for developers. It is nearly impossible to turn on the news and not hear about yet another major security breach. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm TrustZone for Cortex-M processors. We will examine important concepts, such as secure and non-secure domains, setting up a TrustZone RTOS, and debugging a secure application. This session will provide a hands-on demonstration, using Nuvoton’s M2351.
Time
Wednesday, Oct 17 9:00AM - 9:50AM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210H
Speakers
Jacob Beningo
Beningo Embedded Group
1:30pm
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
1:30PM - 2:20PM
Hannes Tschofenig, Arm; Peter Torelli, EEMBC
show more
Description
Communication security technologies, like Transport Layer Security (TLS), are readily available for developers to use to protect their IoT systems. Still, developers are reluctant to use state-of-the-art security technologies due to the impact on performance, code size and RAM, and energy. What is the impact of encryption algorithms, hash functions, and public key cryptosystems, on a specific microcontroller? In this talk I will introduce a new security benchmark developed by EEMBC that will allow silicon manufacturers and developers to analyze and select the appropriate microcontroller.
Time
Wednesday, Oct 17 1:30PM - 2:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210H
Speakers
Hannes Tschofenig
Arm
Peter Torelli
EEMBC
2:30pm
How Security Provisioning Considerations Affect Your Armv8-M based Firmware Design Process
2:30PM - 3:20PM
Rajeev Gulati, Data I/O Corporation; Steve Pancoast, Secure Thingz
show more
Description
Designing a secure device based on an Armv8-M core is one thing. Designing a secure device that can easily be provisioned in high volume is quite another. The latter requires a modern workflow which integrates security into all phases of a product’s life. With a cost-effective and scalable security provisioning methodology, these IoT devices may be produced securely anywhere in the world. Too often there is a gap between the design and manufacturing process, impacting time-to-market and quality. The modern workflow closes the gap between design and production. This session looks at best practices for designing and provisioning trusted devices.
Time
Wednesday, Oct 17 2:30PM - 3:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210H
Speakers
Rajeev Gulati
Data I/O Corporation
Steve Pancoast
Secure Thingz
Unified Zero-touch Model to Provision Arm & Intel Devices to Pelion
2:30PM - 3:20PM
Guy AlLee, Intel Corporation; Geoffrey Cooper, Intel Corporation; John Hengeveld, Arm
show more
Description
Today, it takes nearly 20 minutes to manually provision each device to IoT management platforms like Pelion, AWS, or Azure. Many solutions require one-off preloading of configurations by SIs or OEM device manufacturers, only apply to Arm or Intel devices, or are not open to work with any device management system. In this joint Pelion and Intel presentation, we showcase a groundbreaking solution that will enable any Arm- or Intel-based sensor to onboard to Pelion with privacy preserved. Demo: TrustZone- based sensor and Intel gateway will provision to Pelion in seconds at the touch of a power button.
Time
Wednesday, Oct 17 2:30PM - 3:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210G
Speakers
Guy AlLee
Intel Corporation
Geoffrey Cooper
Intel Corporation
John Hengeveld
Arm
3:30pm
Working Together to Secure the Internet of Things - Sponsored By Arm
3:30PM - 4:20PM
Andrew Frame, Arm; Srinivas Kumar, Mocana; Haydn Povey, Secure Thingz; Yuxin Zhou, Express Logic
show more
Description
Securing the Internet of Things is not something that one company or entity can achieve on their own. This panel will discuss how collaboration is required across the whole ecosystem to truly secure devices. The panel will discuss some key collaboration elements including: the Arm Platform Security Architecture (PSA), the creation of firmware and software that adheres to PSA principles, plus the need for accessible and utilizable APIs and professional tools. The panel will represent many areas of the IoT ecosystem including: microcontroller manufacturers, development tools, real-time operating systems, security software solutions and cloud service providers.
Time
Wednesday, Oct 17 3:30PM - 4:20PM
Session Type
Sponsored Session
Pass Type
All-Access Pass,Expo Floor Pass
Location
Meeting Room 211A/C
Speakers
Andrew Frame
Arm
Srinivas Kumar
Mocana
Haydn Povey
Secure Thingz
Yuxin Zhou
Express Logic
4:30pm
A Guide to Securing Embedded Devices with TrustZone - Sponsored By Arm
4:30PM - 5:20PM
Jacob Beningo, Beningo Embedded Group; Kobus Marneweck, Arm
show more
Description
Securing embedded systems has become a critical task for developers as more devices become connected and upgradable over the Internet. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm® TrustZone® for Cortex®-M processors. We will examine important concepts, such as Secure and Non-secure domains, setting up a TrustZone RTOS and debugging a secure application. This interactive session will provide a hands-on demonstration of the newly released Microchip SAM L11, a Cortex-M23 based chip with TrustZone. We will use Arm Keil MDK to demonstrate how to get TrustZone up and running on both hardware, and also in simulation, using a virtual processor. Topics covered in this session include: – Introduction to TrustZone – Defining the Secure and Non-secure world – Example use cases to secure an application with TrustZone – Implementing an RTOS in the TrustZone environment – How to debug a TrustZone-based application – Best practices for securing an embedded system – Recommendations for next steps
Time
Wednesday, Oct 17 4:30PM - 5:20PM
Session Type
Sponsored Session
Pass Type
All-Access Pass,Expo Floor Pass
Location
Meeting Room 211A/C
Speakers
Jacob Beningo
Beningo Embedded Group
Kobus Marneweck
Arm
Methods for Provisioning Security Features in an M33-based MCU Using a Physically Unclonable Function
4:30PM - 5:20PM
Rob Cosaro, NXP Semiconductors
show more
Description
Security is becoming an important part of all devices connected to the Internet, but along with security comes the complication of provisioning the microcontroller with secret keys. In this session, we’ll discuss the traditional methods of injecting secret keys into OTP, but one of the most interesting part of this presentation is the introduction of a new type of key storage called physically unclonable function, or PUF, and what this brings to security. With PUF, the microcontroller contains the key without having to inject a secret key. This opens up different options that make provisioning easier and more secure.
Time
Wednesday, Oct 17 4:30PM - 5:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210F
Speakers
Rob Cosaro
NXP Semiconductors
Thursday, October 18
9:00am
PSA in Practice - Developing with Trustonic on Cortex-M23
9:00AM - 9:50AM
Richard Hayton, Trustonic
show more
Description
Arm’s Cortex-M23 and Cortex-M33, with their Platform Security Architecture, provide the underpinnings for secure IoT. This talk shows how secure devices can be built in practice by leveraging commercial silicon that has been preprovisioned with Trustonic’s secure Kinibi-M micro-TEE and device identity. The talk covers: • Development of a trusted module, with a “hello world” worked example • Debugging and testing of the trusted module on a test board • Deployment steps for a commercial device where debug access is naturally restricted We will also cover some of the key benefits for device makers focusing on IP protection/fraud prevention.
Time
Thursday, Oct 18 9:00AM - 9:50AM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210G
Speakers
Richard Hayton
Trustonic
11:30am
Advancing IoT Communication Security with TLS and DTLS v1.3
11:30AM - 12:20PM
Hannes Tschofenig, Arm
show more
Description
Missing communication security is a common vulnerability in Internet of Things deployments. Addressing this vulnerability is, in theory, relatively easy: with TLS and DTLS, two widely used security protocols are available. They are used to secure web and smart phone apps. In this talk I will explain how the TLS/DTLS 1.3 protocols work and how they differ from previous versions. I will also talk about the performance improvements and how they help in IoT deployments.
Time
Thursday, Oct 18 11:30AM - 12:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210F
Speakers
Hannes Tschofenig
Arm
2:30pm
Ensuring Silicon-to-Cloud Security for Your Medical Device
2:30PM - 3:20PM
Kaushal Vora, Renesas Electronics; Henrik Flodell, Renesas Electronics
show more
Description
While medical devices have always been designed with safety and quality in mind, today’s design emphasis is centered around connected, software-driven medical device security. Security not only impacts safety and quality but also ensures compliance, revenue/IP, and brand protection. In this session, we will discuss a platform approach to security on an Arm-based microcontroller. Here, security starts with securing your firmware, critical data, and keys in the hardware, forming your root-of-trust. We will then discuss how security and trust are extended to your cloud. We also review how designing for security impacts operations, budgets, planning, and insurance/compliance requirements.
Time
Thursday, Oct 18 2:30PM - 3:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210G
Speakers
Kaushal Vora
Renesas Electronics
Henrik Flodell
Renesas Electronics
New Business Models For Cellular IoT
2:30PM - 3:20PM
Loic Bonvarlet, Arm
show more
Description
Today almost every M2M device includes a SIM card. The cost of procuring the SIM card for an M2M application, getting someone to physically put it in the SIM card slot and then verify the network connection usually costs upwards of $25. The advent of eUICC (eSIM) technology presents an opportunity to streamline the costs which should propel the IoT market. In this discussion, we look at the new opportunities that iSIM brings to the value chain and possible new business models and revenue streams the industry can benefit from. Ultimately, no single platform will be able to offer all features for all verticals in an IoT environment characterized by a “platform of platforms” approach, with open, interoperable platforms interacting with and complementing each other in a “system of systems” constellation and open ecosystem. Therefore, using easy-to-integrate and standards-based services is a key requirement as different players in the ecosystem build their business propositions.
Time
Thursday, Oct 18 2:30PM - 3:20PM
Session Type
Sponsored Session
Location
Executive Ballroom 210D
Speakers
Loic Bonvarlet
Arm
3:00pm
Why Arm for Secure IoT - Sponsored By Arm
3:00PM - 3:30PM
Andrew Frame, Arm
show more
Description
For the IoT market to grow and scale, the ecosystem needs to have confidence that the connected devices they are deploying are designed and built with security in mind. The IoT value chain needs to consider the full spectrum of security considerations, throughout the lifecycle of a device, from security analysis and threat mitigation, through to provisioning and updates. This presentation will review the market challenges and describe how Platform Security Architecture rallies the ecosystem to addresses them. We will show how the combination of Arm services and secure IoT frameworks can ensure the success of evolving IoT business models.
Time
Thursday, Oct 18 3:00PM - 3:30PM
Session Type
Arm TechCon Theater Session
Pass Type
All-Access Pass,Expo Floor Pass
Location
Arm TechCon Theater
Speakers
Andrew Frame
Arm
4:30pm
A More Secure IoT: Fact or Fake News?
4:30PM - 5:20PM
Ed Sperling, SemiEngineering; Anthony Ambrose, Data I/O Corporation; Haydn Povey, Secure Thingz; Andrew Frame, Arm
show more
Description
In the past year, Arm rolled out its Platform Security Architecture program and has introduced targeted security solutions, such as the Arm Cortex-M35P processor and Arm Musca-A1 test chip board. Multiple stakeholders including silicon vendors, OEMs, and software developers are collaborating to align a fragmented supply chain. But is the IoT more secure today than one year ago? Has the industry actually moved the needle when it comes to more secure IoT? This panel pulls together a range of perspectives to consider the progress made around IoT security and discuss possible areas that Arm and its ecosystem still could address.
Time
Thursday, Oct 18 4:30PM - 5:20PM
Session Type
Conference Session
Pass Type
All-Access Pass
Location
Executive Ballroom 210H
Speakers
Ed Sperling
SemiEngineering
Anthony Ambrose
Data I/O Corporation
Haydn Povey
Secure Thingz
Andrew Frame
Arm
Close Filters
Day
Tuesday [6]
Wednesday [7]
Thursday [6]
Time
9:00 AM [3]
10:00 AM [0]
10:05 AM [0]
10:25 AM [0]
10:30 AM [0]
10:50 AM [0]
11:00 AM [0]
11:05 AM [0]
11:30 AM [1]
12:00 PM [0]
12:30 PM [0]
12:45 PM [0]
1:30 PM [2]
2:15 PM [0]
2:30 PM [6]
3:00 PM [1]
3:30 PM [2]
3:45 PM [0]
4:30 PM [4]
5:30 PM [0]
Topic
Arm Mbed Connect [1]
Arm TechCon Theater Session [11]
Automotive, Industrial and Functional Safety [14]
Connected Devices and Cloud Services [12]
Edge Computing and Machine Learning [24]
Embedded Software Development [8]
High-Efficiency Systems [4]
Keynote [11]
Sponsored Session [34]
Sponsored Workshop [1]
System Design Methodology [10]
Trust and Security
Session Type
Arm Mbed Connect Session [0]
Arm TechCon Theater Session [1]
Conference Session [14]
Conference Workshop [0]
Keynote [0]
Sponsored Session [4]
Sponsored Workshop [0]
Pass Type
All-Access Pass [17]
Arm Mbed Connect Pass [0]
Expo Floor Pass [3]