April 5-7, 2022|Santa Clara Convention Center| Santa Clara, CA

Welcome to the DesignCon 2022 agenda and presentation download site. Here you can view and download conference, Chiphead Theater, and other event presentations before, during, and after the event. If you're looking for a presentation from a specific session that you're unable to find here, it is likely because the presenter has not provided permission for external use or has not yet shared their presentation with us. Please check back after the event for a more complete catalog of available presentations.

Securing the compute edge: A proactive process that takes forethought, planning, preparation, and execution


Stephen Olsen  (Principle Field Application Engineer, Blackberry)

Location: Ballroom B

Date: Thursday, April 7

Time: 3:05 pm - 3:35 pm

Track: Embedded IoT World

Format: Embedded IoT World Session

Theme : Internet of Things (IoT)

Education Level: All

Pass Type: 2-Day Pass, All Access Pass, Expo Pass

Vault Recording: TBD

Audience Level: All

The IoT is made up of many different manufactures from consumer electronics to remote sensors, and from industrial control systems to medical robots and even self-driving cars. Since these devices are so pervasive and so connected, they are a clear target for exploitation. So if one node can be compromised, then there are potentially hundreds even thousands of nodes that can be compromised as well. The harm done can range from causing the unit to no longer function, to potentially injuring an operator, passenger or consumer – and these can result in a tarnished brand. So how can you prevent exploitation?

We will address some of the fundamental layers of security that you can deploy to ensure a robust product lifecycle and minimize the risk of being hacked. Starting with establishing a hardware root of trust, you can provision keys securely within the system. This enables you to perform secure over-the-air system upgrades for both new software loads as well as provisioning and decommissioning security keys. Then you can focus on securing the software supply chain by establishing exactly what is in your IoT devices. We will look at techniques to ensure the system is tamper-proof, including: only granting access to applications that truly need access, locking down the filesystem, controlling both temporal and spatial aspects of the embedded system, and monitoring to ensure run-time integrity.