Using a hardware root of trust and a secure development lifecycle process to form the basis of a better approach to developing and implementing more secure complex SoCs.
IoT security is critical. Embedding a root of trust in hardware can provide the firm foundation necessary for a more secure IoT implementation.
The challenges of creating a more secure IoT, and the role that hardware roots of trust can play in doing so.
View All Sponsors