Arm TechCon 2017 Schedule

View, browse and sort the list of sessions by Pass Type, Track, Day/Time, or by Speaker. Sessions are subject to change. Seating is on a first-come, first-served basis. Please arrive early to ensure you get a seat.

Build your conference agenda today! By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule. This personalized schedule will be synced with the official Arm TechCon Event App.

End-to-end Security Derived from a Hardware Based Root of Trust

Location:  Ballroom G
Pass Type: All-Access Pass - Get your pass now!
Track: Trust & Security
Format: 50-Minute Technical Session
Audience Level: Intermediate
Recording: TBD

Too many IoT deployments both within the consumer space and within Industrial IoT, lack a trusted end-to-end security solution starting with device and service attestation leverage a HW based secure root of trust to enable secure on-boarding, the communication, the data and the interaction in a M2M or M2C context from a trusted source. Without the level of device trust and assurance, data sent from the device, or any interaction with it can be bogus and not trusted. Data privacy, confidentiality will be compromised, IoT devices including anything from toys to cars not trusted and secured.

Takeaway

IoT security needs to be designed and provisioned at manufacturing time, derived from a hardware based root of trust. ARM Trustzone is an good enabler to ensure and provide such trust. This root of trust is fundamental to enable unique device credentials, prove of authenticity, source for data, source or target for automation, and encrypt and sign data at the edge. Only in conjunction with a single IoT security solution, IoT security and trust across device and users end-to-end can be guaranteed.