YoVDO

Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation

Offered By: GOTO Conferences via YouTube

Tags

GOTO Conferences Courses Cybersecurity Courses Software Engineering Courses IoT security Courses Remote Attestation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical topic of IoT device security and the role of Remote Attestation (RA) in establishing trust in this 40-minute conference talk from GOTO Aarhus 2023. Delve into the world of IoT security threats and learn how RA techniques can verify device trustworthiness and detect unauthorized modifications. Examine various RA protocols, their assumptions, and applications in IoT environments. Gain insights into attestation mechanisms for IoT swarms and discover future challenges and research directions in this field. Follow along as the speaker covers IoT security basics, remote attestation protocols, open challenges, and concluding thoughts, providing a comprehensive overview of this crucial aspect of cybersecurity.

Syllabus

Intro
Agenda
IoT security
Remote attestation protocols
Open challenges
Conclusions
Outro


Taught by

GOTO Conferences

Related Courses

Exploring Modern and Secure Operations of Kubernetes Clusters on the Edge
Open Data Science via YouTube
Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Hack In The Box Security Conference via YouTube
OAT - Attesting Operation Integrity of Embedded Devices
IEEE via YouTube
The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?
USENIX via YouTube
Riverbed - Enforcing User-defined Privacy Constraints in Distributed Web Services
USENIX via YouTube