Webinar: Introduction to embedded Linux security

In this webinar, an example of threat modeling to identify the security requirements of an embedded Linux system will be discussed, and a wide range of tools and techniques to implement the security requirements will be presented, including secure/verified boot, data integrity and encryption, TPM and key management, secure firmware update and patching, secure coding, sandboxing and containers, TEE, mandatory access control (SELinux, AppArmor, etc),

Leave a Reply

Your email address will not be published. Required fields are marked *