Conferences and supporting programme
Common Pitfalls in IoT Security Implementations and How to Avoid Them
Connected systems need strong security implementations to protect user data, customer networks and the customer's experience. Many traditional products are becoming connected to provide customers with increased convenience and peace of mind. However, many embedded developers new to product security make implementation mistakes because they are unfamiliar with how cryptography works, or they inherit mistakes from the code examples they draw from. This session surveys common errors in cryptography implementations for IoT sleepy nodes including Random Number generation, symmetric encryption and decryption (AES) and public-key Key Exchange (ECDHE), and how to avoid them. We will also provide resources for validating cryptographic implementations and further learning.
--- Date: 28.02.2019 Time: 9:30 - 10:00 Location: Conference Counter NCC Ost