IoT Device Security Mechanisms (Ubiquity Dev Summit 2016)04:33

  • 0
Published on July 16, 2017

Brillo has a defense-in-depth strategy to device security built around verified boot, software fault isolation, and field updates of devices. Paul Covell explains the architecture of each of these mechanisms and how they work together to help Brillo devices be more resistant to exploit and create mechanisms for recovery if an exploit occurs.

Watch more talks from Ubiquity Dev Summit here:

Subscribe to the Google Developers channel at

Music by Terra Monk:

https://cafeadobro.ro/

https://www.stagebox.uk/wp-includes/depo10-bonus10/

https://iavec.com.br/

Enjoyed this video?
"No Thanks. Please Close This Box!"