Mid last year I gave a talk together with Christopher Seidl about how to use the Keil uVision 5 to implement secure device management based on the Arm Pelion platform, which uses the LwM2M protocol under the hood. Christopher did the hands-on session.
Author: Hannes Tschofenig
4th OAuth Security Workshop – Registration now open!
The registration for the 4th OAuth Security Workshop (March 20-22, Stuttgart) is now open. As usual, the workshop will feature interesting talks and discussions around OAuth, OpenID Connect, and related standards and technologies. This time, we also aim to offer tutorials on the morning of the first day and an
Upcoming Event: OAuth Security Workshop
OAuth 2.0 has been around for several years now and I have always been interested to reach out to the wider industry for more feedback about the standardization work. This interest for feedback has led to several workshops and the 4th OAuth Security Workshop (OSW 2019) will take place in
Testing Internet of Things crypto performance and power consumption
With the release of the SecureMark-TLS benchmark by the Embedded Microprocessor Benchmark Consortium (EEMBC) last year, it is now possible to gather information about the performance and power consumption of typically-used cryptographic functions on M-class microcontrollers (MCUs). This benchmark was developed in response to developers’ need to answer questions like “How long
10 things you should know about LwM2M
The Lightweight Machine-to-Machine (LwM2M) protocol is a device management protocol designed for Internet of Things devices and the demands of a machine-to-machine (M2M) environment. Through their LwM2M specification, OMA SpecWorks have helped to address the need for a common standard for managing lightweight and low power devices on a variety of
Securing Internet of Things Applications with Mbed TLS
Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are popular communication security protocols. They have a long history of securing application traffic for web and smartphone applications. Today, they are also used extensively to secure Internet of Things (IoT) communication. At Arm, for example, we use TLS and
Mbed Connect 2018: Summary
I attended Mbed Connect 2018 in San Jose and talked about the role of standards for IoT security. My co-worker Jan Jongboom provided a nice summary in this blog post “It’s a wrap: Mbed Connect US 2018 is done”. I stayed there for the entire event and was surprised about
Arm TechCon 2018, Arm Research Summit, and other speaking opportunities.
I will give two talks at Arm TechCon 2018, see https://www.armtechcon.com. Arm TechCon brings together thousands of engineers, architects, developers and product designer of leading companies in the embedded industry. First, I will focus on the new TLS and DTLS 1.3 specifications and the implementation I have been working on.
Internet of Things Software Update Workshop (IoTSU)
We are organizing another workshop on Internet of Things related matters. This time we will talk about the importance of software / firmware updates. We are seeking input on this topic via the workshop. The workshop webpage also provides examples for topics, such as: Protocol mechanisms for distributing software updates:
OAuth Security Workshop — July 14th and 15th 2016 in Trier/Germany
Early this year we announced our plans to organize an OAuth security workshop on the IETF OAuth mailing list. We did this after we held a per-invitation only security workshop late December in response to the discovery of the OAuth Authorization Server Mix-Up problem. In the meanwhile we have made progress