Security issues within embedded software development
Ron Buskey - Motorola
Sep 12, 2007PDF (88KB) Size: 539.3MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractSoftware development processes and tools used for small communication devices have changed significantly over the years. Some of these practices and processes have resulted in improvements in quality and time to market for their target products, but in some cases have unintended results for the security and trustedness of those same products. This talk will look at several of these practices and approaches that can drive improvements in quality and productivity metrics for embedded communication software development teams yet create vulnerabilities and/or weaken the security architecture for those products.
About the SpeakerRon Buskey leads a team in Motorola Labs focused on security architecture for future product platforms. This research includes techniques for trusted operation and information protection at a fundamental level so that product applications do not have to be concerned with all of the security issues. Ron is working with component providers to design and build security into the platform elements to be used in Motorola product platforms. This will produce enhanced trusted platforms that will be resistant to virus and software hacking attacks on the Motorola products. Previous to working in Motorola Labs, Mr. Buskey spent time as the security architect for the Motorola Mobile Devices Business. He also worked as the lead software engineer for Motorola’s Secure Products business. Since graduating from Rochester Institute of Technology in Rochester N.Y. in 1981 with a BSEE, Ron has held software architecture, secure communications design and computer engineering assignments. Additional information can be found at http://www.motorola.com/content.jsp?globalObjectId=7577-9277
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.