|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Security lessons from embedded devices
If you have a question about this talk, please contact Joseph Bonneau.
Embedded devices are everywhere. As more and more of them are starting to become networked, devices which traditionally had no security requirements are now having to take into account quite sophisticated threat models. In a world where time to market is critical and deployments happen in very large volumes, engineers are often having to learn about security in zero-time while they work.
This talk will discuss some of the technical security measures that are being taken in the embedded world from the perspective of the people implementing them.
This talk is part of the Computer Laboratory Security Group meeting presentations series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsAMOP list Cambridge eScience Centre Trinity Mathematical Society
Other talksChristian Doppler Symposium Dynamic evolution of injury after traumatic brain injury Inferno XV, Purgatorio XV, Paradiso XV The Method of Typical Bounded Differences An overdetermined Free Boundary Problem with non constant boundary conditions Computer crime and the gender ratio problem