Skip to content
CEC Semester Twenty Three 2023

Secure MCUs and RTOSs

Jacob Beningo -
Embedded Software Consultant, Firmware Expert, Smallsat Flight Software
May 22,
2023
Threat Model Security Analysis (TMSA)
The selection of secure microcontrollers and RTOSs depends on the security requirements of the system being designed. Teams will often jump to part and software stack selection before fully understanding their security requirements, which can put the quality of their security solution in jeopardy. In this session, we will explore how to analyze the security needs of a system using a technique known as a Threat Model Security Analysis (TMSA).
Course Resources
Special Educational Materials
The NuMicro M2354 Enables MCU Chip-Level Security with IoT Security Standards Compliant – Video
The Anatomy of Security Microcontrollers for IoT Applications – Article
How to Use TrustZone to Secure IoT Devices with Minimal Hardware Complexity and Cost- Article
What’s Good Enough When It Comes to Security? - Article
May 23,
2023
Secure Microcontroller Solutions
There are a wide variety of hardware solutions developers can leverage to secure their embedded systems. In this session, we will explore secure microcontroller technologies such as memory protection units, secure and unsecure memory and processing, secure peripherals, multicore solutions, and more.
Course Resources
Special Educational Materials
The NuMicro M2354 Enables MCU Chip-Level Security with IoT Security Standards Compliant – Video
The Anatomy of Security Microcontrollers for IoT Applications – Article
How to Use TrustZone to Secure IoT Devices with Minimal Hardware Complexity and Cost- Article
What’s Good Enough When It Comes to Security? - Article
May 24,
2023
Arm TrustZone
A common solution for securing microcontroller applications is to use Arm TrustZone. In this session, we will explore how to configure TrustZone and design secure applications. Attendees will learn how TrustZone works and how to configure secure and non-secure memory as well as explore peripherals and actions developers can take if a security incident is detected by the processor.
Course Resources
Special Educational Materials
The NuMicro M2354 Enables MCU Chip-Level Security with IoT Security Standards Compliant – Video
The Anatomy of Security Microcontrollers for IoT Applications – Article
How to Use TrustZone to Secure IoT Devices with Minimal Hardware Complexity and Cost- Article
What’s Good Enough When It Comes to Security? - Article
May 25,
2023
Secure Boot and Firmware Updates
A key component in securing an embedded system is securely booting the system and performing secure updates. In this session, we will explore the secure boot boot and update process. Attendees will learn the various techniques that can be used to securely boot their system, gain insights into open source solutions, and other techniques they can apply to their own designs.
Course Resources
Special Educational Materials
The NuMicro M2354 Enables MCU Chip-Level Security with IoT Security Standards Compliant – Video
The Anatomy of Security Microcontrollers for IoT Applications – Article
How to Use TrustZone to Secure IoT Devices with Minimal Hardware Complexity and Cost- Article
What’s Good Enough When It Comes to Security? - Article
May 26,
2023
Secure RTOSes
Secure products that use a microcontroller often still require deterministic real-time behaviors. In some applications, a standard RTOS might do, but a secure RTOS can make a big difference. In this session, we will explore the capabilities of secure real-time operating systems and the role they play in secure embedded systems.
Course Resources
Special Educational Materials
The NuMicro M2354 Enables MCU Chip-Level Security with IoT Security Standards Compliant – Video
The Anatomy of Security Microcontrollers for IoT Applications – Article
How to Use TrustZone to Secure IoT Devices with Minimal Hardware Complexity and Cost- Article
What’s Good Enough When It Comes to Security? - Article
Instructor
Jacob Beningo
Embedded Software Consultant, Firmware Expert, Smallsat Flight Software

Jacob Beningo is an embedded software consultant who currently works with clients in more than a dozen countries to dramatically transform their businesses by improving product quality, cost and time to market. He has published more than 300 articles on embedded software development techniques, has published several books, is a sought-after speaker and technical trainer and holds three degrees which include a Masters of Engineering from the University of Michigan.