Every one of us touches hundreds of embedded systems every day. From the sensors and micro controllers in small appliances to your increasingly complex car to the internet that keeps you connected, these systems enable the modern world to function smoothly and efficiently.
But what happens when these systems become the target of attacks or simply fail to implement basic security? The results can be a prank – the college kid who took control of a yacht remotely or who changes roadside signs by hacking into them – or potentially disastrous, as has been the case with the stubborn Stuxnet virus that has infiltrated critical infrastructure.
This month, experts from embedded systems and security convent at the Nuremberg Embedded World conference, http://www.embedded-world.eu/program/. In past years, the conference focused on developments in general hardware and software. In recent years, it has added security tracks and this year, an entire day will be dedicated to the issue.
On Feb. 25, check out sessions from leading European and international experts on cryptography, embedded open source security, the TPM and more.
TCG’s own Florian Scheiner, co-chair of the group’s Embedded Systems Work Group and TPM guru, will talk about the root of trust and its role in securing embedded systems.
Watch for developments from TCG in this space and check out the agenda for more information,http://www.embedded-world.eu/program/.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.