Agenda

Filtered by:

Clear All
Tuesday, October 16
9:00am Heavyweight Security for a Lightweight, Low-power World 9:00AM - 9:50AM William Adams, CENTRI Technology show more Description Everything starts and ends with your data, and taking personal responsibility for its protection is now critical across the industry. Whether you're an expert developing IoT solutions, sensors, or smart devices, you already know implementing IoT security is difficult for resource-constrained embedded environments. Ensuring the data is protected at the first mile, last mile, and every mile between presents a challenge for the true edge across multiple communication protocols. In this session we will look at some of the key challenges involved in securing your IoT data from creation to consumption. Time Tuesday, Oct 16 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E
1:30pm Optimizing threat modeling to create robust IoT security solutions  1:30PM - 2:20PM Suresh Marisetty, Arm show more Description The expected growth of IoT devices will be fuelled by a myriad of use cases, including surveillance cameras, smart meters and asset trackers. These use cases each have power, performance and area (PPA) constraints and more importantly, the need for robust security. Threat Modeling and Security Analysis is a systematic approach, which helps to architect security requirements, optimized for a specific use case. These requirements needs to be mapped to a design that operates within the desired PPA constraints.  This presentation will walk you through threat modeling and how Arm’s Platform Security Architecture can help make robust IoT security solutions. Time Tuesday, Oct 16 1:30PM - 2:20PM Session Type Sponsored Session Location Executive Ballroom 210E
2:30pm Hack-proofing Your C/C++ Code 2:30PM - 3:20PM Greg Davis, Green Hills Software show more Description While 85% of embedded designs use C and C++, these languages are notorious for allowing unsafe code practices that give hackers a way to attack. This talk shows exactly how to keep your Internet-connected product safe by writing your code properly the first time. Well-proven tools and techniques can be used to augment any software-design paradigm, and to effectively hack-proof your code. Techniques include coding conventions, automatic run-time error checking, manual compile-time and run-time assertions, static analysis, and the most common mistakes to avoid. Time Tuesday, Oct 16 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210E IoT and Silicon Security: Dissecting a Real-life IoT Attack 2:30PM - 3:20PM Chowdary Yanamadala, Arm show more Description Billions of IoT devices are expected to densely populate our cities, homes, offices, and factories. Many of use cases will involve value data and physical proximity – ripe for silicon attacks. IoT attack mitigation has been broadly focused around software counter measures; however, the barrier for physical attacks is increasingly being lowered and silicon security urgently needs protecting. If IoT designers fail to protect all relevant attack vectors, significant data is at risk. In this talk, we will analyze a real-life attack, reviewing the flaws, providing a systematic approach to security and demonstrating how you can now mitigate against silicon vulnerabilities. Time Tuesday, Oct 16 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
3:30pm Mocana & Arm: Accelerated & Secure Solution Development 3:30PM - 4:20PM Srinivas Kumar, Mocana show more Description Arm TrustZone Platform Security Architecture (PSA) and Mocana TrustCenter and TrustPoint offer a hardened and integration-ready system for compliance with ISO 26262, IEC 62443, NIST 800- 63-3, and IIC Endpoint Security Best Practices. Together, the firmware TPM (fTPM), hardware-based acceleration, firmware isolation levels, and the Trust Abstraction Platform provide APIs for accelerated solution development on Arm-based devices. This joint Mocana/Arm case study will discuss the above framework and how it overcomes the shortcomings of fTPM implementations from the past. Time Tuesday, Oct 16 3:30PM - 4:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F
4:30pm Platform Security Architecture: One Year On 4:30PM - 5:20PM Robert Coombs, Arm show more Description Last year, at Arm TechCon, we introduced the Arm Platform Security Architecture (PSA), which is designed to provide a framework to reduce the complexity of building secure IoT devices. In 2018, so far, we have published editable IoT threat models, started an open source software project and published the first architecture documents. This presentation will first cover the basics of PSA, what we’ve achieved in the first 12 months, and then new work on APIs and compliance. Time Tuesday, Oct 16 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
Wednesday, October 17
9:00am Securing the IoT with Arm TrustZone for the Cortex-M 9:00AM - 9:50AM Jacob Beningo, Beningo Embedded Group show more Description Securing embedded systems has become a critical task for developers. It is nearly impossible to turn on the news and not hear about yet another major security breach. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm TrustZone for Cortex-M processors. We will examine important concepts, such as secure and non-secure domains, setting up a TrustZone RTOS, and debugging a secure application. This session will provide a hands-on demonstration, using Nuvoton’s M2351. Time Wednesday, Oct 17 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
1:30pm Measuring the Performance and Energy Cost of Cryptography in IoT Devices 1:30PM - 2:20PM Hannes Tschofenig, Arm; Peter Torelli, EEMBC show more Description Communication security technologies, like Transport Layer Security (TLS), are readily available for developers to use to protect their IoT systems. Still, developers are reluctant to use state-of-the-art security technologies due to the impact on performance, code size and RAM, and energy. What is the impact of encryption algorithms, hash functions, and public key cryptosystems, on a specific microcontroller? In this talk I will introduce a new security benchmark developed by EEMBC that will allow silicon manufacturers and developers to analyze and select the appropriate microcontroller. Time Wednesday, Oct 17 1:30PM - 2:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
2:30pm How Security Provisioning Considerations Affect Your Armv8-M based Firmware Design Process 2:30PM - 3:20PM Rajeev Gulati, Data I/O Corporation; Steve Pancoast, Secure Thingz show more Description Designing a secure device based on an Armv8-M core is one thing. Designing a secure device that can easily be provisioned in high volume is quite another. The latter requires a modern workflow which integrates security into all phases of a product’s life. With a cost-effective and scalable security provisioning methodology, these IoT devices may be produced securely anywhere in the world. Too often there is a gap between the design and manufacturing process, impacting time-to-market and quality. The modern workflow closes the gap between design and production. This session looks at best practices for designing and provisioning trusted devices. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H Unified Zero-touch Model to Provision Arm & Intel Devices to Pelion 2:30PM - 3:20PM Guy AlLee, Intel Corporation; Geoffrey Cooper, Intel Corporation; John Hengeveld, Arm show more Description Today, it takes nearly 20 minutes to manually provision each device to IoT management platforms like Pelion, AWS, or Azure. Many solutions require one-off preloading of configurations by SIs or OEM device manufacturers, only apply to Arm or Intel devices, or are not open to work with any device management system. In this joint Pelion and Intel presentation, we showcase a groundbreaking solution that will enable any Arm- or Intel-based sensor to onboard to Pelion with privacy preserved. Demo: TrustZone- based sensor and Intel gateway will provision to Pelion in seconds at the touch of a power button. Time Wednesday, Oct 17 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G
3:30pm Working Together to Secure the Internet of Things - Sponsored By Arm 3:30PM - 4:20PM Andrew Frame, Arm; Srinivas Kumar, Mocana; Haydn Povey, Secure Thingz; Yuxin Zhou, Express Logic show more Description Securing the Internet of Things is not something that one company or entity can achieve on their own. This panel will discuss how collaboration is required across the whole ecosystem to truly secure devices. The panel will discuss some key collaboration elements including: the Arm Platform Security Architecture (PSA), the creation of firmware and software that adheres to PSA principles, plus the need for accessible and utilizable APIs and professional tools. The panel will represent many areas of the IoT ecosystem including: microcontroller manufacturers, development tools, real-time operating systems, security software solutions and cloud service providers. Time Wednesday, Oct 17 3:30PM - 4:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C
4:30pm A Guide to Securing Embedded Devices with TrustZone - Sponsored By Arm 4:30PM - 5:20PM Jacob Beningo, Beningo Embedded Group; Kobus Marneweck, Arm show more Description Securing embedded systems has become a critical task for developers as more devices become connected and upgradable over the Internet. In this session, attendees will become familiar with the design methodologies necessary to secure their embedded systems using the new Arm® TrustZone® for Cortex®-M processors. We will examine important concepts, such as Secure and Non-secure domains, setting up a TrustZone RTOS and debugging a secure application. This interactive session will provide a hands-on demonstration of the newly released Microchip SAM L11, a Cortex-M23 based chip with TrustZone. We will use Arm Keil MDK to demonstrate how to get TrustZone up and running on both hardware, and also in simulation, using a virtual processor. Topics covered in this session include: – Introduction to TrustZone – Defining the Secure and Non-secure world – Example use cases to secure an application with TrustZone – Implementing an RTOS in the TrustZone environment – How to debug a TrustZone-based application – Best practices for securing an embedded system – Recommendations for next steps Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Sponsored Session Pass Type All-Access Pass,Expo Floor Pass Location Meeting Room 211A/C Methods for Provisioning Security Features in an M33-based MCU Using a Physically Unclonable Function 4:30PM - 5:20PM Rob Cosaro, NXP Semiconductors show more Description Security is becoming an important part of all devices connected to the Internet, but along with security comes the complication of provisioning the microcontroller with secret keys. In this session, we’ll discuss the traditional methods of injecting secret keys into OTP, but one of the most interesting part of this presentation is the introduction of a new type of key storage called physically unclonable function, or PUF, and what this brings to security. With PUF, the microcontroller contains the key without having to inject a secret key. This opens up different options that make provisioning easier and more secure. Time Wednesday, Oct 17 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F
Thursday, October 18
9:00am PSA in Practice - Developing with Trustonic on Cortex-M23 9:00AM - 9:50AM Richard Hayton, Trustonic show more Description Arm’s Cortex-M23 and Cortex-M33, with their Platform Security Architecture, provide the underpinnings for secure IoT. This talk shows how secure devices can be built in practice by leveraging commercial silicon that has been preprovisioned with Trustonic’s secure Kinibi-M micro-TEE and device identity. The talk covers: • Development of a trusted module, with a “hello world” worked example • Debugging and testing of the trusted module on a test board • Deployment steps for a commercial device where debug access is naturally restricted We will also cover some of the key benefits for device makers focusing on IP protection/fraud prevention. Time Thursday, Oct 18 9:00AM - 9:50AM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G
11:30am Advancing IoT Communication Security with TLS and DTLS v1.3 11:30AM - 12:20PM Hannes Tschofenig, Arm show more Description Missing communication security is a common vulnerability in Internet of Things deployments. Addressing this vulnerability is, in theory, relatively easy: with TLS and DTLS, two widely used security protocols are available. They are used to secure web and smart phone apps. In this talk I will explain how the TLS/DTLS 1.3 protocols work and how they differ from previous versions. I will also talk about the performance improvements and how they help in IoT deployments. Time Thursday, Oct 18 11:30AM - 12:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210F
2:30pm Ensuring Silicon-to-Cloud Security for Your Medical Device 2:30PM - 3:20PM Kaushal Vora, Renesas Electronics; Henrik Flodell, Renesas Electronics show more Description While medical devices have always been designed with safety and quality in mind, today’s design emphasis is centered around connected, software-driven medical device security. Security not only impacts safety and quality but also ensures compliance, revenue/IP, and brand protection. In this session, we will discuss a platform approach to security on an Arm-based microcontroller. Here, security starts with securing your firmware, critical data, and keys in the hardware, forming your root-of-trust. We will then discuss how security and trust are extended to your cloud. We also review how designing for security impacts operations, budgets, planning, and insurance/compliance requirements. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210G New Business Models For Cellular IoT 2:30PM - 3:20PM Loic Bonvarlet, Arm show more Description Today almost every M2M device includes a SIM card. The cost of procuring the SIM card for an M2M application, getting someone to physically put it in the SIM card slot and then verify the network connection usually costs upwards of $25. The advent of eUICC (eSIM) technology presents an opportunity to streamline the costs which should propel the IoT market. In this discussion, we look at the new opportunities that iSIM brings to the value chain and possible new business models and revenue streams the industry can benefit from. Ultimately, no single platform will be able to offer all features for all verticals in an IoT environment characterized by a “platform of platforms” approach, with open, interoperable platforms interacting with and complementing each other in a “system of systems” constellation and open ecosystem. Therefore, using easy-to-integrate and standards-based services is a key requirement as different players in the ecosystem build their business propositions. Time Thursday, Oct 18 2:30PM - 3:20PM Session Type Sponsored Session Location Executive Ballroom 210D
3:00pm Why Arm for Secure IoT - Sponsored By Arm 3:00PM - 3:30PM Andrew Frame, Arm show more Description For the  IoT market to grow and scale, the ecosystem needs to have confidence that the connected devices they are deploying are designed and built with security in mind. The IoT value chain needs to consider the full spectrum of security considerations, throughout the lifecycle of a device, from security analysis and threat mitigation, through to provisioning and updates. This presentation will review the market challenges and describe how Platform Security Architecture rallies the ecosystem to addresses them. We will show how the combination of Arm services and secure IoT frameworks can ensure the success of evolving IoT business models. Time Thursday, Oct 18 3:00PM - 3:30PM Session Type Arm TechCon Theater Session Pass Type All-Access Pass,Expo Floor Pass Location Arm TechCon Theater
4:30pm A More Secure IoT: Fact or Fake News? 4:30PM - 5:20PM Ed Sperling, SemiEngineering; Anthony Ambrose, Data I/O Corporation; Haydn Povey, Secure Thingz; Andrew Frame, Arm show more Description In the past year, Arm rolled out its Platform Security Architecture program and has introduced targeted security solutions, such as the Arm Cortex-M35P processor and Arm Musca-A1 test chip board. Multiple stakeholders including silicon vendors, OEMs, and software developers are collaborating to align a fragmented supply chain. But is the IoT more secure today than one year ago? Has the industry actually moved the needle when it comes to more secure IoT? This panel pulls together a range of perspectives to consider the progress made around IoT security and discuss possible areas that Arm and its ecosystem still could address. Time Thursday, Oct 18 4:30PM - 5:20PM Session Type Conference Session Pass Type All-Access Pass Location Executive Ballroom 210H
Close Filters
Day


Time



















Topic











Session Type






Pass Type