From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
Foundations of trust: Part 4
From the course: IoT Product Security
Foundations of trust: Part 4
Hi, I'm Matthew Clark. And this is Lesson 4.4: Foundations of Trust, Part 4. In this lesson, we'll look at the threat profile matrix. We'll discuss physical security and how to abuse a root of trust. And we'll conclude with the case study. So let's get started. Let's start with the quiz question. Which of the following are elements of a root of trust? Cryptographic functions, secure boot, isolated environments, or immutable code? Trick question because they're all elements of a root of trust. Can you name the elements that are missing? Secure processor and secure storage. Yeah, absolutely. So let's take a look at a threat profile matrix. When the OEM is designing the architecture, the CPSO will perform a threat analysis as part of that risk assessment. She will look at the logical and physical vulnerabilities and identify any local and remote threats which could exploit those vulnerabilities. So logical vulnerabilities could be threats in this code, secure implementation of…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-