KEYNOTE 1: Hardware Security is Hard: How Hardware Boundaries Define Platform Security                        
                                    
                
                   
            
						
        Nowadays it’s difficult to find any hardware vendor who develops all the components present in their platform. The big piece of it outsourced to OEM’s includes firmware too. That creates additional complexity and limits hardware vendor control under the platform. That creates not only supply chain security risks but also produce security gaps in the […]