TRUSTED COMPUTING GROUP WORKSHOP

Let's Build in Security: A Workshop to Secure Embedded and IoT Systems

Wednesday, June 26 | 10:00am - 5:00pm

In a workshop hosted by the industry standards organization Trusted Computing Group, embedded and IoT security experts will address ways to design effective security in early, when it can ensure the safety and security of not only the system but related data and networks. Learn key concepts of the root of trust (RoT) and how a new lightweight RoT can be used for specific IoT security. Hear about APIs targeted to embedded development, and discover new work to secure platforms for cyber resiliency. There will be demos and networking with industry experts from Infineon and Microsoft.

AGENDA

10:00 - 10:15 AM: Welcome/Overview of Trusted Computing Group 
10:15 - 11:45 AM: Building Trustworthy Embedded Systems
11:45 AM - 1:00 PM: Lunch Break (not provided)
1:00 - 2:00 PM: DICE Architectures
2:00 - 2:15 PM:  Beverage Break
2:15 - 3:15 PM: Cyber Resilient Technologies
3:15 - 5:00 PM: Company Demonstrations and Networking
5:00 PM: Conclusion of Workshop

SESSION DESCRIPTIONS

Building Trustworthy Embedded Systems
With the move to IoT, embedded systems are increasingly intelligent and connected. But this intelligence and connectivity bring new risks that can compromise security, privacy, and even safety. Trusted Computing technologies provide a solid foundation for embedded systems with features like measured boot, secured storage, and local and remote attestation. Learn how Trusted Computing primitives are best applied in embedded systems and how to overcome challenges specific to embedded systems such as low cost, low power, and real-time constraints.

Trusted Computing Group I DICE Architectures 
Device Identifier Composition Engine (DICE) Architectures provide critical security and privacy benefits to IoT and embedded systems where traditional Trusted Platform Modules (TPM) may be impractical.  This new approach enables strong cryptographic device identity, device firmware configuration and security policy attestation, secure deployment and verification of updates, and device recovery/resiliency (see NIST 800-193).

The DICE Architecture’s hardware Root of Trust (RoT) enables creation of cryptographic keys and secrets rooted in not only firmware and/or configuration measurements, but also a device’s unique hardware identity.  This is the foundation for the critical security scenarios that are of increasing importance in IoT today.

Cyber Resiliency Abstract
In June 2018, the TCG Cyber Resilient Technologies workgroup began working on formalizing widely useful resilient technologies to improve the protection, detection and recovery of devices and components of computing platforms.  This session will cover the first year of output from the workgroup.
TPM/TSS

Cyber Resilient Technologies
In June 2018, the TCG Cyber Resilient Technologies workgroup began working on formalizing widely useful resilient technologies to improve the protection, detection and recovery of devices and components of computing platforms. This session will cover the first year of output from the workgroup.

All ETC attendees can attend free of charge; must opt in during registration or in the Attendee Resource Center. Space is limited; first-come, first-seated.

register today Group

workshop sponsor

Trusted Computing Group

workshop sponsor

Trusted Computing Group