Introduction to embedded Linux security

preview_player
Показать описание
Security is a key feature in every connected product. But the real question is: what do you want to secure? Do you want to protect the Intelectual Property? Or maybe the integrity of your product? Do you want to secure data at rest? And what about data in transit? These and other questions can be answered with a proper threat modeling process so potential threats can be identified and mitigated. In this webinar, an example of threat modeling to identify the security requirements of an embedded Linux system will be discussed, and a wide range of tools and techniques to implement the security requirements will be presented, including secure/verified boot, data integrity and encryption, TPM and key management, secure firmware update and patching, secure coding, sandboxing and containers, TEE, mandatory access control (SELinux, AppArmor, etc), authentication, port scanning, and many more!

Talk presented at Embedded Linux Conference NA 2020.
Рекомендации по теме
Комментарии
Автор

Muito bom! Qual curso ou treinamento que voce indicaria aprender a criar/compilar linux para sistemas embarcados ?

mauriciolucas