This resource is no longer available
This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software.
It covers software risks as they apply to embedded software, how to go about threat modeling activity and how the process can lead to defensive coding, and how it can be used to improve code review processing and penetration testing.