Skip to content
CEC Semenster Undefined

Protecting Your Embedded System From Hacking & Theft

No data was found
December 2,
2013
Security Threats to Your Embedded System
This class will identify the most common security threats to network-connected, embedded systems all along the system lifecycle. We will start with the component supply chain and follow a typical embedded system all the way to system decommissioning, while identifying many common security threats along the way.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
December 3,
2013
Protecting Your Embedded System Design Intellectual Property
One of the most vulnerable parts of an embedded system is the design itself. How can you protect your design from copying, cloning, overbuilding, and reverse engineering? This class will cover some key techniques that can protect your design from these threats.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
December 4,
2013
Cryptographic Techniques to Protect Your Embedded System
Modern techniques for security and authentication use a few key cryptographic concepts and algorithms to protect data and processes in embedded systems. This class provides an introduction to the most common techniques and standards, so you can better understand how these approaches may be used in your designs.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
December 5,
2013
Protecting Your Embedded System in the Field
Once your embedded system is deployed it is a target, either directly by "invasive"¬ù probing of the actual board or via network-based attacks. Protecting your systems from these threats requires the use of advanced techniques like establishing a Root-of-Trust, secure remote update, and/or a secure boot process.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
December 6,
2013
Example Designs
This class will pull together information from all the previous classes and illustrate the described techniques using several example designs from different market segments and application areas. This will solidify your understanding of both the key security concepts and the various design techniques illustrated in the course.
Course Resources
Special Educational Materials
Listen/Download Archive (mp3)
No data was found