One of the greatest challenges facing developers creating connected systems is securing their devices. In the good old disconnected days, developers only had to concern themselves with physical tampering but today, systems are also vulnerable to remote attacks that can result in device cloning, repurposing, intellectual property theft, data manipulation and many other potential issues. In this course, we will examine how developers can start to secure their embedded systems using arm TrustZone for microcontrollers.
November 26, 2018, to November 30, 2018
Continuing Education Center