Write For Us

IoT Device Security Mechanisms (Ubiquity Dev Summit 2016)

E-Commerce Solutions SEO Solutions Marketing Solutions
194 Views
Published
Brillo has a defense-in-depth strategy to device security built around verified boot, software fault isolation, and field updates of devices. Paul Covell explains the architecture of each of these mechanisms and how they work together to help Brillo devices be more resistant to exploit and create mechanisms for recovery if an exploit occurs.
Watch more talks from Ubiquity Dev Summit here:
Subscribe to the Google Developers channel at
Music by Terra Monk:
Category
Tutorials
Sign in or sign up to post comments.
Be the first to comment