Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about critical security mechanisms for ensuring hardware component integrity throughout complex supply chains in this conference talk. Explore how traceability enables tracking of components from fabrication to deployment, helping detect tampering and unauthorized substitutions. Discover how provenance verification ensures each component's origin and manufacturing history can be authenticated, reducing risks from maliciously altered hardware. Understand secure provisioning techniques that safeguard device initialization and configuration while preventing unauthorized access during deployment. Examine how unclonable cryptographic identities provide unique device identification for strong attestations. Gain insights into how these combined elements create the foundation for resilient and trustworthy hardware supply chains, addressing growing security concerns in today's interconnected technology landscape.
Syllabus
Device to Cloud Supply Chain Provenance
Taught by
Open Compute Project