Logic Technology: free seminars addressing software insecurities

The ever-increasing connectedness of electronic systems provides a whole new world of opportunity. But with that opportunity comes a brand-new challenge; keeping your functional system safe and secure, especially when there is a need for certification.

Free seminars in Munich, 6 March 2018; Frankfurt, 7 March 2018; and Eindhoven, 8 March 2018; will highlight several issues to consider when designing a functionally safe secure system and will detail how, alongside features such as domain separation and rootkit protection, the security features of the application code itself provide an essential slice in a “Swiss Cheese” defence of a connected system. A demonstration of how automated tools can streamline the development of securely coded applications is included.

Sometimes, the need for security is obvious – perhaps in the banking sector, or when classified government information is involved. On other occasions, the requirement is more subtle. For example, it is a vital consideration for connected electronic systems required to meet industrial (e.g. IEC 61508) or automotive (e.g. ISO 26262) functional safety standards because connected systems cannot be safe if they are vulnerable to cyberattack.   

These cyberattacks take a host of different forms, and there are many perspectives to consider. For example, rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that antivirus software will overlook, and then remain undetected while they steal information for an extended period.

Then there are cross-domain attacks, where aggressors access critical domains via their more vulnerable, less critical counterparts. The securing of separate domains is a well-publicized factor in adhering to the principles of either the Industrial Internet Reference Architecture (IIRA) or the Reference Architectural Model for Industrie 4.0 (RAMI 4.0), and increasingly important in the automotive sector. In both cases, the application of MILS “Least Privilege” principles can be of fundamental assistance to minimise the size of attack surfaces.

The application software provides another arrow in the security quiver. If that is not written with security in mind, then it is likely to include vulnerabilities meaning that once a domain is accessed, aggressors have a means to access sensitive data or to modify system functionality. This need has replaced the traditional reactive testing approach with a proven Proactive testing methodology during the development lifecycle to enhance security assurance.

Senior executives, technical managers, system architects, product managers, test engineers or anyone wanting a better understanding of the development of highly secure embedded systems with reduced certification risk and time-to-market should attend.

More Information...

Latest News from Logic Technology

Logic Technology: J-Testr RF, a new test solution for the IoT
Logic Technology: FlashFX Tera 4.2 extends MLC NAND flash support for automotive and IIOT
Logic Technology: the ‘Swiss Knife’ for testing PCBA’s
Logic Technology: free seminars addressing software insecurities
Logic Technology: Systech and XJTAG offer enhanced testing
Logic Technology: professional GUI framework supporting NXP i.MX RT series
Logic Technology: high quality graphics using only internal memory
Logic Technology: faster electronics test development with XJTAG Boundary Scan v3.6
Logic Technology: Datalight releases NitroBoot 2.0
Logic Technology: GNU/Eclipse IDE for ARM now available for use on Linux workstations
Logic Technology: closing the gap between developers and designers
Logic-Technology: Cortex-M and Eclipse/GNU Training Course
Logic Technology: workshop on model-driven software design

Arduino CEO Fabio Violante on their migration upwards in engineering

In this video Arduino CEO Fabio Violante talks about their ambitious migration upwards in engineering solutions and products with Alix Paultre in Tegernsee, Germany. Arduino, long known for their deve...


Silicon Lab CEO Tyson Tuttle talks about their wireless IoT portfolio

In this video Silicon Lab's Tyson Tuttle talks to Alix Paultre about their new wireless IoT portfolio. Wireless Xpress provides a configuration-based development environment, with certified Blueto...


Keysight's Joachim Peerlings talks about the new UXR series Oscilloscope

In this video Keysight's Joachim Peerlings talks about the new UXR series Oscilloscope with Alix Paultre at their launch event in Munich. The Infiniium UXR-Series of oscilloscopes has models rangi...


BrainChip explains their new Neuromorphic System-on-Chip

In this video, Bob Beachler of BrainChip talks to Alix Paultre about their latest single-chip neural network technology.  Spiking neural networks (SNNs) are inherently lower power than traditiona...


Vincotech – EMPOWERING YOUR IDEAS

In this video the Vincotech team walks us through the most important topics displayed on their booth at PCIM Europe 2018. It also explains why Vincotech is First in SiC Modules. Being very flexible in...


Microchip talks about their latest secure microcontroller

Microchip's new SAM L10 and SAM L11 families of 32-bit microcontrollers (MCUs) address the growing need for security in Internet of Things (IoT) endpoints by protecting against the increasing the ...


E-Mail Newsletters

nlsc240

Our 3 E-Mail Newsletters: EETimes/EDN Europe, Embedded News and Power Electronics News inform about the latest news in technology and products, as well as technical know-how like white papers, webinars, articles, etc.


B & S / ECE Magazine

- latest issue is online now -

November 2018

Content Highlights

Cover Story

Internet-connected displays make the industrial IoT more visible

Download now


wholesale jerseys