Last Year's Agenda - MT (Mexican Pacific Time, GMT-07:00)
Hosted at the very beginning of both days, our wellbeing sessions will set you up for a day filled with learning and networking.
By moving closer to the edge, machine learning is profoundly changing the IoT landscape, where RISC-V is already seeing immense success. To be able to fully capitalize on the opportunities that arise from this trend, as well as tackle the related challenges, various communities must come together to create an open ecosystem of modern tools, frameworks and platforms that together will constitute a seamless environment for developers to build advanced ML applications on RISC-V.
The keynote panel will feature representatives of Google, Zephyr Project, QuickLogic, STMicroelectronics and Antmicro in a discussion of how the strengths of RISC-V, Zephyr RTOS, TensorFlow Lite and Renode can be combined to provide innovative, collaborative, software-driven and traceable ML development for the very edge, also on the hardware level, e.g. using FPGAs or RISC-V custom extensions. The participants will discuss modern testing methodologies and HW-SW co-development enabled by the Renode simulation framework - as used by e.g. Google’s TF Lite Team - unlocking efficient and deterministically testable ML development on platforms including RISC-V.
Other hot topics will include open source FPGA tools and Renode support for the Core-V MCU, recent developments concerning TensorFlow Lite Micro, RISC-V joining the Zephyr Project and the ML-oriented, EU-funded VEDLIoT project involving RISC-V and Renode.
The CORE-V family is an OpenHW Group project to develop, deploy, execute pre-silicon functional verification and SoC based evaluation kits of the CORE-V family of open-source RISC-V cores. Written in SystemVerilog, the CORE-V open-source IP matches the quality of IP offered by established commercial providers and is verified with state-of-the-art, auditable flows.
The CORE-V cores are verified using CORE-V-VERIF a silicon-proven, industrial-grade functional verification platform. CORE-V-VERIF has been used to execute a complete verification cycle of the CORE-V CV32E40P core and is currently being used to execute verification of the CV32A6 and CV64A6 cores. CORE-V-VERIF leverage verification components developed by the RISC-V community and will be continuously maintained and enhanced to integrate the latest best-practices and technology for the verification of future CORE-V cores such that CORE-V cores can be used in high-volume production SoCs.
This discussion will dive into one particular solution that combines long-polling, the device authorization grant, and an internet accessible controller to communicate with devices on a local network without opening inbound connections to those devices. We will also spend some time reviewing the attack surfaces of this approach and the required mitigations. Finally, we will spend a little time reviewing some of the COTS solutions that already exist in this area.
- How to use device authorization grant to initialize a device on a local network
- Understand how to create a simple controller that is accessible via the web and enables local devices to interact with it using tokens
- A look at some of the attack surfaces of this approach and the mitigations required
With the rapid development of the Internet of Things, intelligent systems are increasingly finding their way into everyday life and into people’s homes. With the spread of these technologies, there is a growing concern about device security and data privacy.
Many of us already interact with at least 3 to 5 smart devices daily – a smartphone, fitness tracer, a smart TV, voice assistant, and smart appliances to name a few.
Data from one device may not be a problem, but combining data from several devices could create a pattern that may reveal unwanted information about a user. And with more devices coming into homes, concerns around the way personal data is managed, controlled, and used by devices and organizations are increasingly being raised.
In this presentation, Tuya Smart, a global IoT Cloud and Development Platform, will discuss the top security concerns facing tech providers, product manufacturers, and consumers, highlighting best practices to ensure device security, data privacy, and end user peace of mind.
With literally hundreds of certification frameworks across multiple regions and verticals, one thing is clear: security evidence is an important trust enabler. While this trend continues, embedded IoT developers are confronted with the need of showing evidence of the security capabilities in their products. This is relevant for compliance, risk management or simply for accountability.
This presentation introduces SESIP, the Security Evaluation Standard for IoT Platforms. SESIP is a security evaluation scheme designed to support the entire IoT ecosystem. We will explore the state of the market in the area of security evaluations for IoT devices and introduce SESIP, with hands on examples including ETSI EN 303645 for consumer devices, and IEC 62443-4-2 for industrial IoT. Showcasing SESIP applicability and both the technical and commercial benefits for the entire value chain.
- A look at the global security certification and compliance trends for the IoT market
- Understand the benefits of security evaluations for IoT devices
- Experience the concept of composite evaluations as the scalable way to build products with secure, certified components
- Introduction to SESIP as the most relevant scheme in the world for IoT security
Ensuring that the firmware and software on an IoT device are updated to the latest version is critical to maintain a secure state with all the known vulnerabilities addressed. This talk will set the context with pertinent threat landscape data from NVD database on IoT devices. The TCG guidance will be introduced and concludes with the evaluation of technologies including TPM and DICE to achieve the objectives.
Hardware based on the open RISC-V ISA is about to revolutionize the way edge computing devices and applications are developed. Especially RISC-V's flexibility to be extended by application-specific instruction which enables a wide variety of scalable customizations for different application domains. Yet, there are still many challenges to bringing RISC-V scalability into industrial practice.
Scale4Edge aims to address this challenge by providing an ecosystem of RISC-V hardware IP, software development IP and tooling support for scalable edge computing with a special focus on safety, security and embedded AI applications. Scale4Edge promotes a "virtual prototyping first" approach which allows for exploration of the flexibility of RISC-V with a virtual platform combined with the ability to generate most parts of the hardware, software and verification IP for the final target design.
This session will be comprised of three presentations:
Talk 1 - The industrial application view which explains why "virtual prototyping first" is the future of edge computing
Talk 2 - Introduces the flexible VP environment VP-Vibes which provides the building blocks to rapidly set up virtual prototypes of RISC-V processor-based edge devices
Talk 3 - The integration and evaluation of edge AI accelerators
- Gain the technical background needed to understand how the "virtual prototyping first" approach can speed up and improve quality for scalable RISC-V based designs
- Learn about readily available open source solutions and future plans to allow you to quickly bring virtual prototypes into your design flows
- A look at the path forward to also address safety, security and embedded AI applications at the edge using RISC-V based designs
This session will give an overview and discussion on IoT Area in Akraino, including Blueprint Families like ELIOT: Edge Lightweight and IOT, IIoT at the Smart Device Edge, Project Cassini - IoT and Infrastructure Edge. Security, APIs, oneM2M IoT Service Layer Platform will also be reviewed under this IoT Area.
The success of novel technologies in the Beyond Moore’s Law era strongly depends on the idea of specialized hardware and extreme heterogeneity in system architecture. For decades, the research community has been developing techniques for design space exploration having limited interaction with industry partners. The appearance and rapid growth of open-source hardware initiatives, e.g. RISC-V architecture, helps to bridge the gap between academia and industry thereby transforming science and opening up new opportunities.
Head over to the Omdia booth on the platform to ask our analysts your most pressing embedded systems and IoT questions in this exclusive opportunity.
With so many headlines on IoT safety and security, and new attacks happening every week it can be difficult to know where to start. If you’ve ever asked any of the following questions, then this talk is for you:
- Where do I start with IoT security?
- How do I look at security and safety together?
- I’m on a project and what can I do to build secure devices?
This talk will walk through Synopsys’ approach to threat modeling IoT systems and will answer the above questions while also demonstrating how to tie security and safety together with a systems approach.
- Understand the security complications introduced by trends like 5G edge computing and private LTE/5G networking in order to stay protected
- Discover how to apply new cybersecurity frameworks such as homomorphic encryption: Why is this the next big thing?
- Leave this session with hacker vision: Gain the ability to see your networks from the perspective of a hacker
- Best practices in the field of IoT to establish zero-trust systems and networks (for any type of multi-tenant compute or network, not just mobile)
What are the consequences of leaving security as an afterthought when building a product? During this session, Exset Labs’ Security Researcher & Analyst, Diogo Pimentel, will speak about:
1- The current trends within the IoT industry and why you should care
2- The challenges and risks of not taking security seriously
3- What role do legislation and security standards play in ensuring secure products?
4- Types of threats and real world hacking cases/scenarios and what companies like yours can learn from this
5- Solutions to how you can protect your assets
Safety certification is one of the essential requirements for software to be used in highly regulated industries. Besides technical and compliance issues (such as ISO 26262 vs IEC 61508,) transitioning an existing project to become more easily safety certifiable requires significant changes to development practices within an open source project. In this session, we will lay out some challenges of making safety certification achievable in open source. We will be offering an in-depth review of how Xen Project is approaching these challenges and try to derive lessons for other projects and contributors.
- Understand the process of the Xen Project Special Interest Group (SIG)'s journey toward safety certifications so far and lessons learned along the way
- Discover documentation, requirements generation, static code analysis, and contribution processes that need to be improved to make progress
The IoT landscape is rapidly expanding and there's an urgent need for standardized, interoperable and proven end-point security. Years away, right?
Wrong.
Introducing IoTopia
In this presentation GlobalPlatform, a non-profit industry association will deliver insights into its new initiative, IoTopia. The initiative:
• Proposes a common framework to standardize the design, certification, deployment and management of IoT devices.
• Aims to be testable and meet vertical requirements by building on four foundational pillars: secure by design; device intent; autonomous, scalable and secure onboarding; and device life-cycle management.
• Will be a simple but executable framework that is standards-based, industry-wide and able to evolve as security capabilities and requirements change.
• Will provide the opportunity to support tiers of security as well as certification in desired verticals.
How to develop an asset tracking application
- Products: Sensors and platform solutions - discussions of ST's sensors with optimum features necessary to create cost effective, high performance asset tracking applications
- Solutions: Evaluation boards that can address various asset tracking applications using different connectivity options and collect data from sensors
- Create Value: Proof of concept with a sandbox turn key asset tracking application, log and visualize sensor data through a cloud dashboard
Modern buildings contain complex mechanical devices, sophisticated control systems and a suite of features to improve the energy blueprint. As businesses and consumers adjust to life in this 'new normal', it's clear that implementing a 'green recovery' is vital to ensuring that Sustainability is central to every business. With the right guidance and solutions, businesses can put initiatives in place to improve their sites' energy efficiency and reduce their carbon footprint. The concept of sustainability is receiving increasing attention, and sustainable manufacturing & smart spaces is evolving. The digital twin is an emerging technology used in intelligent manufacturing that can grasp the state of intelligent manufacturing systems in real-time and predict system failures.
In this state of the art session, we will look at how contrary to popular belief, achieving stretching sustainability objectives doesn't need to break the bank. We will dive deeper into Digital twin technology and IIoT that aims to put sustainability at the heart of smart cities/ smart spaces initiatives. I will take the audience through a demo of an ideal implementation of a sustainable solution as well. Finally, combined with the current status, the future development direction of "Connected Ecosystems" is presented.
- What exactly is the meaning of a sustainable solution?
- How to think about implementing a Sustainability solution and why IIoT & Digital Twins are so central to this idea
- How Digital Twin technologies can be leveraged by manufacturers to meet sustainability and efficiency goals
The physical world is creating a massive explosion of data and has the opportunity to transform industry and enrich our lives.
With the merging of IT and OT, the complexity in manufacturing rises. IIOT technologies such as artificial intelligence and edge computing, today’s and tomorrow’s challenges in the manufacturing industry can be mastered.
Explore how leading manufacturers integrate AI, Machine Learning, and IoT technology together with deep domain know-how into their automation systems to realize value. Learn in several use cases, such as equipment predictive maintenance, asset management and product and process improvement how this integration brings productivity to the shopfloor and generates value over time.
The data center is no longer the center of data; in fact, data has "left the building! The explosion of IoT data coupled with bandwidth costs, latency, autonomy, and security force users to move applications that would have traditionally run in the cloud towards the edge, but the heterogeneity of the edge introduces unique IoT edge orchestration challenges in a scalable and secure fashion. Agora, a venture of Schlumberger, in partnership with ZEDEDA, is transforming the IoT edge by deploying intelligence in the field through an open and universal multi-vendor IoT edge orchestration system.
- Understand how Agora is transforming the edge as data center solutions don't meet the requirements of harsh environments
- Consolidating workloads by deploying cloud-native containerized apps alongside legacy apps in virtual machines to preserve existing investments
- Gaining visibility, control and lifecycle management across microservices, runtimes, apps, OS and hardware