Electronic Design
  • Resources
  • Directory
  • Webinars
  • CAD Models
  • Video
  • Blogs
  • More Publications
  • Advertise
    • Search
  • Top Stories
  • Tech Topics
  • Analog
  • Power
  • Embedded
  • Test
  • AI / ML
  • Automotive
  • Data Sheets
  • Topics
    - TechXchange Topics --- Markets --AutomotiveAutomation-- Technologies --AnalogPowerTest & MeasurementEmbedded
    Resources
    Electronic Design ResourcesTop Stories of the WeekNew ProductsKit Close-UpElectronic Design LibrarySearch Data SheetsCompany DirectoryBlogsContribute
    Members
    ContentBenefitsSubscribeDigital editions
    Advertise
    https://www.facebook.com/ElectronicDesign
    https://www.linkedin.com/groups/4210549/
    https://twitter.com/ElectronicDesgn
    https://www.youtube.com/channel/UCXKEiQ9dob20rIqTA7ONfJg
    Alexandersikov | dreamstime.com
    Alexandersikov Dreamstime Xxl 126587946 T X
    1. Technologies
    2. Embedded
    3. Security

    Device Security by Design Series - Available On Demand

    Sept. 21, 2023
    This series of webinars addresses the security aspects and recommendations for IoT device design.
    William G. Wong
    Related To: Electronic Design

    Now Available on Demand

    Watch our security-focused webinars using the links below. You will need to be a registered user on this website, which is free. You can sign up now and get access to our members content as well as this series.  

    • Security for IoT Endpoint Devices (details)
    • Securing the Future: Designing Embedded Devices with Security (details)
    • Using AI Anomaly Detection in Embedded Applications (details)
    • Multicore Processors and Hard Real-Time Applications: Mixing Oil and Water? (details)

    You can leave comments or questions for each webinar on the respective page where the video is show or on this page for the series as a whole. 

    Security for IoT Endpoint Devices

    Presented by Reinhard Keil, Sr. Director Embedded Technology, Arm

    This session discusses how standards and the Arm ecosystem can help accelerate IoT development. It focuses on the importance of IoT security and the potential security threats developers must address. Subjects include IoT hardware isolation and software frameworks including the Arm TrustZone hardware isolation and the PSA Certified IoT Security Framework. The session wraps up with a discussion of Project Centauri and collaboration with AWS. 

    Reinhard Keil is Senior Director of Embedded Technology at Arm. His responsibilities include the definition and strategy of tools for Arm microcontrollers and the CMSIS (Cortex Microcontroller Software Interface Standard). He is founder of Keil Software and co-author of several key software products, such as Keil C51, Keil C166, and µVision. Reinhard continues to influence the microcontroller market and advance the technology in the embedded space.

    Securing the Future: Designing Embedded Devices with Security

    Presented by Shawn Prestridge, U.S. Senior Field Applications Engineer Manager, IAR

    As embedded devices become more prevalent in our daily lives, their security has become increasingly important. These devices are used in critical infrastructure, industrial control systems, medical devices, and consumer electronics, making them targets for cyberattacks.To ensure the security of these devices, security must be considered in the design phase.

    This talk will explore the concept of security by design for embedded devices. It will discuss the unique security challenges faced by embedded devices, including resource constraints and the need for real-time performance. The session will also cover the best practices for implementing security by design, such as threat modeling, secure boot, secure communication protocols, and firmware updates.

    Finally, case studies of real-world attacks on embedded devices will be reviewed, and how security by design could have prevented these attacks. By the end of this talk, attendees will have a better understanding of the importance of security by design for embedded devices and the practical steps they can take to implement it.        

    Shawn Prestridge has served as IAR System's Senior Field Applications Engineer since 2008 and as the U.S. FAE Manager since 2018. Shawn has worked in the software industry since 1993. Prior to joining IAR Systems, he held the position of Embedded Hardware/Software Engineer with Texas Instruments and was involved with embedded development as the owner of Ministry of Software. Shawn’s research interests are primarily focused in cryptology and he specializes in large number theory, quantum cryptography, elliptic-curve cryptography, number field sieve computing, and communication encryption.

    Shawn’s degree work includes a BS in electrical engineering, a BS in mathematics, an MS in electrical engineering, an MS in software engineering, and a PhD in electrical engineering specializing in quantum cryptography, all with Southern Methodist University in Dallas.        

    Using AI Anomaly Detection in Embedded Applications

    Presented by Roman Lysecky, CTO, BG Networks

    Machine-learning models are very good at anomaly detection when properly trained. These artificial-intelligence systems are currently used to identify people, places, and things for self-driving cars and picking out bad apples on an assembly line.

    Applying anomaly detection to embedded systems is a challenge, but it's one that can provide benefits like identifying a device that's not working properly or one that might be under attack by nefarious third parties. This session takes a look at this approach and how it's implemented in BG Networks' AnCyR platform.

    Dr. Roman Lysecky is the CTO of BG Networks and Professor Emeritus of Electrical and Computer Engineering at the University of Arizona. He's an expert on embedded systems, IoT security, medical device security, automated threat detection and mitigation, performance and energy optimization, and non-intrusive observation methods. He's also an author of over 100 research publications in top journals and conferences.

    Dr. Lysecky was instrumental in content development for an Ed Tech startup called zyBooks. zyBooks was acquired by John Wiley & Sons in 2019. He holds PhD, MS, and BS degrees in computer science from the University of California, Riverside.        

    Multicore Processors and Hard Real-Time Applications: Mixing Oil and Water? 

    Presented by Mark Pitchford, Technical Specialist, LDRA

    For a single core, the calculation of worst-case execution times (WCET) using static analysis alone can only be an estimate. That problem is exacerbated when more cores are involved, where shared resources such as memory and caches further degrade the theoretical calculation. In an environment where precise timing can mean life or death, approximations do not sit comfortably.

    The most demanding execution paths in the code base can be identified precisely using static analysis. This session will argue that leveraging such information in conjunction with the dynamic measurement of WCET presents the most pragmatic approach to achieving the assurances demanded across the safety-critical sectors, including the CAST-32A & A(M)C 20-193 objectives in civil aviation.

    Mark Pitchford, technical specialist at LDRA, has over 30 years of experience in software development for engineering applications. He has worked on many significant industrial and commercial projects in development and management, both in the UK and internationally. Since 2001, he has worked with development teams looking to achieve compliant software development in safety- and security-critical environments, working with standards such as DO-178, IEC 61508, ISO 26262, IIRA, and RAMI 4.0.

    Mark earned his Bachelor of Science degree at Trent University, Nottingham, and he has been a Chartered Engineer for over 20 years. 

    Continue Reading

    Security Verification for Embedded Hardware Designs

    Arm Unveils Its Most Compact AI-Capable Cortex-M CPU

    Sponsored Recommendations

    Designing automotive-grade camera-based mirror systems

    Dec. 2, 2023

    Design security cameras and other low-power smart cameras with AI vision processors

    Dec. 2, 2023

    Automotive 1 TOPS vision SoC with RGB-IR ISP for 1-2 cameras, driver monitoring, dashcams

    Dec. 2, 2023

    AM62A starter kit for edge AI, vision, analytics and general purpose processors

    Dec. 2, 2023

    Comments

    To join the conversation, and become an exclusive member of Electronic Design, create an account today!

    I already have an account

    New

    Bob Pease on Analog Vol. 3

    Environmental Sensors Target Air Quality

    Whitepaper: IoT Connectivity Considerations and Wi-Fi 6E

    Most Read

    Celebrating Field Engineers: The Unsung Heroes of Innovation

    More Bob Pease on Analog

    2023 Nobel Prizes for Physics and Chemistry Have Direct EE Relevance


    Sponsored

    TI Developer Zone - the fastest path to embedded development

    STM32WBA - 2.4GHz wireless microcontroller with SESIP Level 3 security

    DesignCon 2023 Technical Workshops: In-Situ De-embedding

    Electronic Design
    https://www.facebook.com/ElectronicDesign
    https://www.linkedin.com/groups/4210549/
    https://twitter.com/ElectronicDesgn
    https://www.youtube.com/channel/UCXKEiQ9dob20rIqTA7ONfJg
    • About Us
    • Contact Us
    • Advertise
    • Do Not Sell or Share
    • Privacy & Cookie Policy
    • Terms of Service
    © 2023 Endeavor Business Media, LLC. All rights reserved.
    Endeavor Business Media Logo