ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

10,485 results

STMicroelectronics
Secure Embedded Systems with ST33KTPM- IDevID & WolfSSL

Featuring the cutting-edge ST33KTPM family from STMicroelectronics combined with WolfSSL's WolfTPM software stack, this ...

2:51
Secure Embedded Systems with ST33KTPM- IDevID & WolfSSL

368 views

1 month ago

The Linux Foundation
Introduction to Embedded Linux Security - Sergio Prado, Embedded Labworks

Introduction to Embedded Linux Security - Sergio Prado, Embedded Labworks.

51:25
Introduction to Embedded Linux Security - Sergio Prado, Embedded Labworks

3,065 views

5 years ago

DEFCONConference
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...

54:12
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

282,087 views

1 year ago

Toradex
Introduction to embedded Linux security

Security is a key feature in every connected product. But the real question is: what do you want to secure? Do you want to protect ...

1:38:44
Introduction to embedded Linux security

2,006 views

4 years ago

NorthSec
NorthSec 2019 – Thomas Pornin – T1: Secure Programming For Embedded Systems

Thomas Pornin is a cryptographer, author of the BearSSL library. He works as a consultant for NCC Group, as part of the ...

1:02:14
NorthSec 2019 – Thomas Pornin – T1: Secure Programming For Embedded Systems

575 views

5 years ago

media.ccc.de
36C3 -  TrustZone-M(eh): Breaking ARMv8-M's security

https://media.ccc.de/v/36c3-10859-trustzone-m_eh_breaking_armv8-m_s_security Hardware attacks on the latest generation of ...

57:22
36C3 - TrustZone-M(eh): Breaking ARMv8-M's security

14,224 views

6 years ago

STMicroelectronics
Security Part5 - How to define your security needs - 4 Chain of Trust

Learn why security is important and how STM32Trust framework provide ways to mitigate the threats and vulnerabilities of your ...

6:14
Security Part5 - How to define your security needs - 4 Chain of Trust

667 views

5 years ago

Open Source Security
Embedded Security with Paul Asadoorian

Recently, I had the pleasure of chatting with Paul Asadoorian, Principal Security Researcher at Eclypsium and the host of the ...

34:31
Embedded Security with Paul Asadoorian

66 views

8 months ago

BayLibre
Elephants in our embedded security room (Marta Rybczynska, Ygreky)

Security researchers often assume that embedded developers don't care about security. But from what Marta hears from her ...

36:48
Elephants in our embedded security room (Marta Rybczynska, Ygreky)

132 views

8 months ago

The Linux Foundation
Embedded Linux Conference 2013 - ELC 2013 Security: Best Practices for Embedded Systems

The Linux Foundation Embedded Linux Conference 2013 ELC 2013 Security: Best Practices for Embedded Systems By John ...

32:04
Embedded Linux Conference 2013 - ELC 2013 Security: Best Practices for Embedded Systems

1,882 views

12 years ago

Charbax
PHYTEC Embedded Security

In this video, PHYTEC embedded security specialist Maik Otto explains about the basic security requirements that are required for ...

5:51
PHYTEC Embedded Security

533 views

5 years ago

FOSDEM
Secure and Safe Updates for Your Embedded Device

by Enrico Jörns At: FOSDEM 2017 Recent DDoS attacks powered by embedded devices have finally discredited theold excuse ...

19:57
Secure and Safe Updates for Your Embedded Device

334 views

7 years ago

The Linux Foundation
Navigating Security Tradeoffs in Embedded Linux Systems - Olivier Benjamin, Bootlin

Don't miss out! Join us at the next Open Source Summit in Seoul, South Korea (November 4-5). Join us at the premier ...

45:13
Navigating Security Tradeoffs in Embedded Linux Systems - Olivier Benjamin, Bootlin

205 views

4 months ago

The Linux Foundation
Security in Large Scale Embedded Linux Projects - Martin Lang, BMW Car IT GmbH

Don't miss out! Join us at the next Open Source Summit in Seoul, South Korea (November 4-5). Join us at the premier ...

41:41
Security in Large Scale Embedded Linux Projects - Martin Lang, BMW Car IT GmbH

168 views

4 months ago

Toradex
Introduction to embedded Linux security

Security is a key feature in every connected product. But the real question is: what do you want to secure? Do you want to protect ...

1:21:14
Introduction to embedded Linux security

5,903 views

5 years ago

The Linux Foundation
Yocto Project/OpenEmbedded Meets Security - Marta Rybczynska, Syslinbit

Yocto Project/OpenEmbedded Meets Security - Marta Rybczynska, Syslinbit Building an embedded product is a complicated task.

34:27
Yocto Project/OpenEmbedded Meets Security - Marta Rybczynska, Syslinbit

663 views

2 years ago

0xdade
Embedded Device Vulnerability Analysis Case Study Using Trommel - Kyle O’Meara and Madison Oliver

Researching embedded devices is not always straightforward, as such devices often vastly differ from one another. Such research ...

32:10
Embedded Device Vulnerability Analysis Case Study Using Trommel - Kyle O’Meara and Madison Oliver

327 views

7 years ago

media.ccc.de
Andrei Costin: (In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale

Embedded systems are omnipresent in our everyday life and are becoming increasingly present in many computing and ...

59:06
Andrei Costin: (In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale

803 views

10 years ago

HACK NYC
Adventures in Embedded Device Exploration and Exploitation - Bobby Kuzma

Adventures in Embedded Device Exploration and Exploitation with Bobby Kuzma at NYC Cyber Security meetup at Black Rock ...

40:38
Adventures in Embedded Device Exploration and Exploitation - Bobby Kuzma

533 views

9 years ago

The Linux Foundation
Embedded Linux Conference 2013 - Namespaces for Security

The Linux Foundation Embedded Linux Conference 2013 Namespaces for Security By Jake Edge San Francisco, California ...

56:36
Embedded Linux Conference 2013 - Namespaces for Security

3,042 views

12 years ago

FOSDEM
Secure Microkernel for Deeply Embedded Devices

by Jim Huang At: FOSDEM 2017 Embedded system development is a complex area in which the developers need tohave a deep ...

35:44
Secure Microkernel for Deeply Embedded Devices

133 views

7 years ago

Bootlin
Navigating Security Tradeoffs in Embedded Linux Systems, Olivier Benjamin

... but mostly in two cities in France and I mean I'm in so in the southeast let's talk about embedded systems security um so security ...

45:13
Navigating Security Tradeoffs in Embedded Linux Systems, Olivier Benjamin

348 views

4 months ago

The Linux Foundation
The Bootloader: An Underestimated Risk To Embedded Linux Security - Richard Weinberger

Don't miss out! Join us at the next Open Source Summit in Seoul, South Korea (November 4-5). Join us at the premier ...

31:02
The Bootloader: An Underestimated Risk To Embedded Linux Security - Richard Weinberger

138 views

4 months ago

STMicroelectronics
DevCon 2020 Presentation: Secure and Non-secure Applications with STM32L5 Trustzone

STM32L5 series of Ultra-low-power MCUs Security has emerged as one of the 3 key areas that developers of embedded and IoT ...

26:16
DevCon 2020 Presentation: Secure and Non-secure Applications with STM32L5 Trustzone

571 views

5 years ago

The Linux Foundation
TPM Is No Silver Bullet: Pitfalls in Embedded Device Security - David Gstir, sigma star gmbh

Don't miss out! Join us at the next Open Source Summit in Seoul, South Korea (November 4-5). Join us at the premier ...

38:42
TPM Is No Silver Bullet: Pitfalls in Embedded Device Security - David Gstir, sigma star gmbh

273 views

4 months ago