11:00 AM - 11:30 AM
Zephyr: Creating a Best-of-Breed, Secure RTOS for IoT
Kate Stewart, Sr. Director of Strategic Programs, Linux Foundation
Zephyr is a new upstream open source project for places where Linux is too big to fit. The starting point for Zephyr is from a commercial project that has been made open for the community to evolve and enhance into a secure best-of-breed RTOS for the IoT ecosystem. This talk will provide an overview of how we are incorporating leading technologies into the code base, and building up the community to support multiple architectures and development environments.
11:30 AM - 12:00 PM
Optimizing Memory in IoT and Embedded Applications
Francois Bedard, Sr. R&D Manager, Operating Systems and Open Source Software, Synopsys
IoT edge devices need to provide required performance at ultra-low power and low cost to enable ubiquitous deployment. Both SoC silicon area and memory usage must be minimized to reduced overall system cost. In this session you will learn how to deploy an embARC-based IoT edge application software stack in a fraction of the memory required.
12:00 PM - 12:30 PM
Using a Qualified Compiler to Develop Safety-Critical Software
Mitesh Shah, Manager, Software Engineering, Synopsys
The MetaWare Compiler has been qualified for use as the compilation toolchain when developing safety-critical applications according to ISO 26262. It can be used for components with a maximum Automotive Safety Integrity Level ASIL D. This session will describe how to use the compiler and the accompanying documentation in order to be in compliance with these important safety standards.
12:30 PM - 1:30 PM
LUNCH and DEMOS
1:30 PM - 2:00 PM
Sensor Processing for Smart Home and IoT
Dave Karlin, VP of Strategy, Hillcrest Labs
Many emerging applications, such as virtual reality, augmented reality, and robotics have unique sensor processing requirements and require an optimum combination of hardware and software. This presentation will focus on how Hillcrest Labs’ specialized software and Synopsys’ ARC processors can enable high-accuracy, low-power sensor processing for Smart Home and a wide range of IoT applications.
2:00 PM - 2:30 PM
Using the MPU with an RTOS to Enhance System Safety and Security
Steve Ridley, Principal Software Engineer, Wittenstein
For safety-critical software, it is necessary to understand the requirements of the application, be able to demonstrate that the requirements have been met and prove that all the code is necessary and tested. This disciplined approach to engineering is the starting point for safety applications. Run time monitoring of an application and its underlying hardware is also commonplace. One hardware peripheral that can help with this is a Memory Protection Unit (MPU). Correct configuration of the MPU can allow software bugs or corruption to be trapped before damage can occur; however, active management of the MPU in conjunction with an RTOS allows meaningful task/thread isolation of mission critical parts of the application. This presentation discusses methods of achieving partitioning and error detection using the MPU.
2:30 PM - 3:00 PM
Software Development Kits for Simplifying Security Implementation
Mike Borza, Member of Technical Staff, Security IP, Synopsys
Secure Boot can greatly enhance the security of an embedded system by verifying that the code being loaded and executed has not been unknowingly or maliciously modified. This presentation will cover the Secure Boot Software Development Kit, which allows developers to implement Secure Boot systems using software-only constructs or with Synopsys offload engines. It will also provide an overview of Synopsys cryptography software, which includes a comprehensive suite of widely used crypto algorithms and simple plug-in modules to transparently support hardware acceleration or offload.
3:30 PM - 4:00 PM
A Lightweight Trusted Execution Environment for IoT Edge Devices
Ruud Derwig, Software and Systems Architect, Synopsys
Developing completely bug-free software is complex and costly, but the bugs that remain pose a security threat when maliciously exploited. In addition, software in a device comes from sources with different trust levels: internal development, external suppliers, open source, and maybe even end-users. The standard solution for mixed-criticality components is isolation. For security this means a securely shielded Trusted Execution Environment. For low power/cost IoT edge devices, however, a separate secure processor or full virtualization is not an option. This session presents a lightweight solution to efficiently shield secure from non-secure software on a single microcontroller.
4:00 PM - 4:30 PM
Pervasive Authentication for IoT: ARC Processors with PUFs
Pim Tuyls, CEO, Intrinsic-ID
This presentation will explain Physical Unclonable Functions (PUF) technology and how it can be used for authentication and encryption in IoT and embedded systems. Also, it will cover how PUF is integrated into the ARC architecture and how it interacts with other security features and crypto accelerators. The presentation includes an example using PUF to authenticate a sensor to the cloud and guidance for designers who need to find a balance between performance, code size, and gate count.
4:30 PM - 5:00 PM
Embedded Natural Language Voice Interfaces
Kashif Kahn, CEO, Sage Senses
Advances in machine learning and embedded engineering technologies now make it possible to design and implement sophisticated natural language voice interfaces on ordinary microcontrollers. Embedded voice interfaces address connectivity, bandwidth, latency, energy, and/or privacy issues associated with cloud-based speech systems. They can be utilized either as a complement (eg. backup) or as an alternative to cloud-based speech systems. For most “command-and-control” applications in consumer and industrial domains, a natural language voice interface can be deployed on a microcontroller with less than 1 MB of RAM+ROM and 200 MHz CPU. Further, a developer can train a sophisticated Natural Language Understanding (NLU) engine for his voice interface with a small amount of data.
5:00 PM - 5:30 PM
The Case for Trace
Hugh O’Keeffe, Engineering Director, Ashling
Embedded debugging techniques have evolved from printf() to the more advanced techniques used today including run-control debug and real-time trace. This presentation will explain these two approaches and discuss the advantages of real-time trace and why it is suitable for validating and debugging complex systems including multicore architectures based on DesignWare ARC Processors. Specific use-cases will be presented showing how to use real-time trace to identify and solve common errors.