Overview
Syllabus
Embedded Linux Conference North America 2020
INTRODUCTION TO SECURITY
SECURITY CONCEPTS III
THREAT MODELING
STRIDE
DREAD
THREAT MODEL EXAMPLE
SECURE BOOT CONCEPTS
HOW DOES IT WORK?
SECURE BOOT ON i.MX6
CODE AND DATA ENCRYPTION
SECURE BOOT WITH ENCRYPTION
WHERE IS THE KEY?
PRIVATE KEY STORAGE
KEY STORAGE ON .MX PROCESSORS
KEY STORAGE ON EXTERNAL DEVICES
SECURE ELEMENT
SECURE CODING
STATIC CODE ANALYSIS
RUNTIME PROTECTIONS
FUZZING TOOLS
PERMISSIONS
ACCESS CONTROL
LINUX CAPABILITIES
DAC vs MAC
LINUX SECURITY MODULES
APPLICATION SANDBOXING
LINUX CONTAINERS
CONTAINERS AND SECURITY
TEE IMPLEMENTATION
UPDATE SYSTEM AND SECURITY
UPDATE CHALLENGES
UPDATE STRATEGIES
NETWORK SECURITY
DEFENSE IN DEPTH!
SECURITY GENERAL RULES
DESIGN FOR SECURITY
Taught by
Linux Foundation