- Embedded Application Security Best Practices
- What are Embedded Systems?
- Buffer and Stack Overflow Protection
- Injection Prevention
- Firmware Updates and Cryptographic Signatures
- Securing Sensitive Information
- Identity Management
- Embedded Framework and C-Based Toolchain Hardening
- Usage of Debugging Code and Interfaces
- Transport Layer Security
- Usage of Data Collection and Storage - Privacy
- Third Party Code and Components
- Threat Modeling
- About OWASP