Aug. 22, 2022, 1:20 a.m. | Lena Boeckmann, Peter Kietzmann, Leandro Lanzieri, Thomas Schmidt, Matthias Wählisch

cs.CR updates on arXiv.org arxiv.org

IoT devices differ widely in crypto-supporting hardware, ranging from no
hardware support to powerful accelerators supporting numerous of operations
including protected key storage. An operating system should provide uniform
access to these heterogeneous hardware features, which is a particular
challenge in the resource constrained IoT. Effective security is tied to the
usability of cryptographic interfaces. A thoughtful API design is challenging,
and it is beneficial to re-use such an interface and to share the knowledge of
programming embedded security widely. …

api crypto embedded iot os security

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States