QorIQ Platform's Trust Architecture Overview: Add Trust to Networked and Networking Systems

File uploaded by Geoffrey P Waters Employee on Mar 19, 2015Last modified by Renee Fortenberry on Apr 1, 2015
Version 4Show Document
  • View in full screen mode

The news of the past year hasn’t been encouraging for those who wished cyberspace would avoid becoming a geopolitical battleground. It is now confirmed that national governments are exploiting weaknesses in network infrastructure and end point security to conduct cyber surveillance and disrupt the operations of networks and other critical infrastructure. But with QorIQ platforms, embedded systems designers can do more than throw up their hands and surrender. QorIQ products include features like secure boot, which OEMs can use to make it significantly harder for their systems to be hacked. This session will briefly describe the threats which the Trust Architecture is intended to address and provide an overview the features and methods it uses to resist hacks.

 

Presented by Geoff Waters

Presented at DwF Silicon Valley - March 26, 2015

Session ID: AMF-SNT-T1041

Attachments

Outcomes