Arm TechCon 2017 Schedule

View, browse and sort the list of sessions by Pass Type, Track, Day/Time, or by Speaker. Sessions are subject to change. Seating is on a first-come, first-served basis. Please arrive early to ensure you get a seat.

Build your conference agenda today! By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule. This personalized schedule will be synced with the official Arm TechCon Event App.

"Confidentiality, Integrity & High-Availability" (CIA) for Cyber Security @Edge

  • Iisko Lappalainen (Sr. Manager Technical Presales & Solutions, MontaVista Software LLC)
  • Veena Nagendrappa (Senior Technical Solutions Engineer, MontaVista Software    )
Pass Type: All-Access Pass - Get your pass now!
Track: Trust & Security
Format: 50-Minute Technical Session
Audience Level: All
Recording: TBD

Smart, inter-connected devices are chaining worldwide networks into configurable services. However, this new avenue is prone to security and trust challenges, leaving the chain as good as its weakest link. Enabling advanced security in an IoT gateway ensures comprehensive root of trust at the edge throughout the product lifecycle. The presentation will cover:
- Purpose, Challenges and Approach for delivering proactive security in edge IoT Gateways to withstand known and zero day attacks.
- Architecture, Security, and Device Maintenance for an Arm 64 based secure gateway reference design using Cavium™ Octeon Tx (81xx) SoC and MontaVista Carrier Grade eXpress Linux.


Cybersecurity challenges for edge connected devices are on the rise, some experts say exponentially. Linux and Arm offer native technologies readily available to help create solutions that secure on-boarding and enable cryptographic security. Developers today then have the means to architect and deploy secure edge devices.

Intended Audience

Resource constrained, "dumb" sensors at the edge can become the network's weakest security link. Hence, designing security for IoT Gateways is critical to withstand opportunistic and disruptive hackers. Linux® and ARM® offer technologies ensuring root of trust, enabling "Secure Boot", "Linux Integrity Management (IMA/EVM)", and "Secure Update" for High Availability.