Staying one step ahead in embedded security at ESC/EELive!

By Bernard Cole

At the ESC/EELive 2014, embedded developers concerned about protecting their increasingly networked systems can take advantage of an intensive three day track of classes on the latest in security technology.

Android malware and the smartphone security threat

A recent report from Alcatel-Lucent's Kindskight Security Labs says that more than 11.6 million mobile devices are infected worldwide, and 60% of them are Android smartphones.

App developers are weak link for Android security

A study from German university researchers found that 1,074 apps out of 13,500 free Android apps analyzed had weak Secure Sockets Layer (SSL) implementation that could potentially make them vulnerable to attack.

KFKI, Wibu AG team on integrated security for industrial networks

To deal with the many security challenges of the Industry 4.0 and the Internet of Things, the German Research Center for Artificial Intelligence (DFKI) and Wibu Systems AG have launched an intensive cooperative long term effort

Exploiting the security vulnerabilities of industrial PLCs

An analysis of various programmable logic controller intrusion methods and how these techniques can be used to attack a PLC.

Security and vulnerability assessment of Zigbee home area networks

An analysis of security and privacy issues of ZigBee implementations that power utilities are currently being deployed for testing of wireless based Smart Grid networks with pilot users.

Testing the security of connected industrial infrastructure systems and devices

Nate Kube of Wurldtech details the security pitfalls in the supervisory control and data acquisition (SCADA) systems in industrial infrastructure.

Securing Mobile and Embedded Devices: Encryption is not Security

Steven Yee of BSQUARE describes a comprehensive security strategy for mobile and embedded devices that addresses all of the factors important in guaranteeing success, including technical limits, hackers, and the behavior of your users.

Genivi and beyond: The future of in-vehicle infotainment security

This two part article discusses next-generation infotainment system architectural approaches that address automotive networking security issues from the ground up.

Adding M2M security to RTOS-enabled MCUs, MPUs or FPGAs

A brief tutorial on adding security to any connected embedded design using machine-to-machine (M2M) connectivity protocols.

Building a security-optimized embedded design using protected key storage

A survey of the ways the security of an embedded microcontroller-based design can be compromised and how such intellectual-property theft can be avoided.

Security fundamentals for embedded software

Even if your device is not connected to the Internet, you need to protect it from malicious attacks. Here are some simple protections you can institute to make your system more impenetrable.


Education

AdaCore University - Learn to Program in Ada

Fundamentals of Signal and Power Isolation

Fundamentals of Digital Oscilloscope Usage

Automating Test Case Selection and Execution for Chipset Testing

Look Ma, no hands! How technology innovation is driving automotive safety and autonomous vehicles



UBM 

Tech

This e-mail was sent to EmailAddress


Go to Embedded.com
A UBM Tech Newsletter ©2014. All rights reserved.
Privacy Policy I Advertising Information I Unsubscribe
UBM Tech, 303 Second Street, Suite 900 South, San Francisco, CA 94107