Real-World Deployment of Firmware Security in Embedded Devices

Sponsor Stage

With a new decade of pervasive firmware vulnerabilities upon us, continuous runtime protection of embedded firmware will secure devices against firmware-level exploitation. This session will discuss a new generation of firmware-level defense being deployed in the real world and how to apply host-based firmware security to ICS devices. We will discuss our past year’s research and experience in securing power distribution systems and most recently the building automation systems in a Biological Safety Level 3 (BSL-3) laboratory.

Secure Design & Dev Supply Chain