Protecting Intellectual Property in the IoT with Trusted Computing

Presented by

Steve Hanna of Infineon and Günther Fischer of WIBU

About this talk

Loss of IP Can Cost Companies Millions – or Even the Business. Join this Webcast to Learn How to Protect Data in the Internet of Things Attackers often use reverse engineering to locate software vulnerabilities that they then can exploit to create counterfeit products, steal sensitive data, or tamper with for sabotage and espionage purposes. In IoT and embedded systems, this can lead to serious and dangerous hacks, as recent attacks on safety-critical automotive components have shown. How can developers protect against such attacks? This webcast will discuss widely vetted industry standards and solutions to protect software integrity against cyber violations and safeguard the intellectual property. The webcast will provide a brief overview of the TPM and how it is being used to create secured code and licenses. Attendees will learn how these licenses can be bound to a secure element and integrated into existing business processes. Speakers from TCG members Infineon and WIBU also will answer questions about this approach.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (10)
Subscribers (3492)
The Trusted Computing Group (TCG) is incorporated as a not-for-profit industry standards organization focused on developing, defining, and promoting open standards for trusted computing that will benefit users. The organization's structure has been designed to enable broad participation, efficient management, and widespread adoption of the organization's specifications.