Logic Technology: free seminars addressing software insecurities

The ever-increasing connectedness of electronic systems provides a whole new world of opportunity. But with that opportunity comes a brand-new challenge; keeping your functional system safe and secure, especially when there is a need for certification.

Free seminars in Munich, 6 March 2018; Frankfurt, 7 March 2018; and Eindhoven, 8 March 2018; will highlight several issues to consider when designing a functionally safe secure system and will detail how, alongside features such as domain separation and rootkit protection, the security features of the application code itself provide an essential slice in a “Swiss Cheese” defence of a connected system. A demonstration of how automated tools can streamline the development of securely coded applications is included.

Sometimes, the need for security is obvious – perhaps in the banking sector, or when classified government information is involved. On other occasions, the requirement is more subtle. For example, it is a vital consideration for connected electronic systems required to meet industrial (e.g. IEC 61508) or automotive (e.g. ISO 26262) functional safety standards because connected systems cannot be safe if they are vulnerable to cyberattack.   

These cyberattacks take a host of different forms, and there are many perspectives to consider. For example, rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that antivirus software will overlook, and then remain undetected while they steal information for an extended period.

Then there are cross-domain attacks, where aggressors access critical domains via their more vulnerable, less critical counterparts. The securing of separate domains is a well-publicized factor in adhering to the principles of either the Industrial Internet Reference Architecture (IIRA) or the Reference Architectural Model for Industrie 4.0 (RAMI 4.0), and increasingly important in the automotive sector. In both cases, the application of MILS “Least Privilege” principles can be of fundamental assistance to minimise the size of attack surfaces.

The application software provides another arrow in the security quiver. If that is not written with security in mind, then it is likely to include vulnerabilities meaning that once a domain is accessed, aggressors have a means to access sensitive data or to modify system functionality. This need has replaced the traditional reactive testing approach with a proven Proactive testing methodology during the development lifecycle to enhance security assurance.

Senior executives, technical managers, system architects, product managers, test engineers or anyone wanting a better understanding of the development of highly secure embedded systems with reduced certification risk and time-to-market should attend.

More Information...

Latest News from Logic Technology

Logic Technology: FlashFX Tera 4.2 extends MLC NAND flash support for automotive and IIOT
Logic Technology: the ‘Swiss Knife’ for testing PCBA’s
Logic Technology: free seminars addressing software insecurities
Logic Technology: Systech and XJTAG offer enhanced testing
Logic Technology: professional GUI framework supporting NXP i.MX RT series
Logic Technology: high quality graphics using only internal memory
Logic Technology: faster electronics test development with XJTAG Boundary Scan v3.6
Logic Technology: Datalight releases NitroBoot 2.0
Logic Technology: GNU/Eclipse IDE for ARM now available for use on Linux workstations
Logic Technology: closing the gap between developers and designers
Logic-Technology: Cortex-M and Eclipse/GNU Training Course
Logic Technology: workshop on model-driven software design

E-Mail Newsletters

nlsc240

Our 3 E-Mail Newsletters: EETimes/EDN Europe, Embedded News and Power Electronics News inform about the latest news in technology and products, as well as technical know-how like white papers, webinars, articles, etc.


B & S / ECE Magazine

- latest issue is online now -

June 2018

Content Highlights

Cover Story

The challanges of IoT security and how to harden the edge

Download now


wholesale jerseys