Sunil Cheruvu
Sunil Cheruvu is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation and has been involved in architecting complex systems involving HW/FW/SW for almost 23 years. Implementing the code for Baseline Privacy security in DOCSIS compliant Cable Modems when he was a Senior SW Engineer at 3com and a SW Staff Engineer at Conexant. Working at Microsoft as a SW Design Engineer, he was the tech lead for Vehicle Networking involving the Bus and Protocol driver stacks. He took the stacks through the threat modeling and implemented the resolutions in what was released as the Windows Mobile for Automotive (WMfA) platform. At Intel, he was the Content Protection lead and owned the system level architecture of Conditional Access and Trusted Data Path (end-2-end premium content protection within a SoC.) Architecting the security for embedded devices and in his current role as the Principal Engineer, owns the scaling of security (from below Atom to Xeon) and on multiple Operating Systems. He is the subject matter expert for IOTG security across Intel and outside of Intel. Sunil Cheruvu is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation and has been involved in architecting complex systems involving HW/FW/SW for almost 23 years. Implementing the code for Baseline Privacy security in DOCSIS compliant Cable Modems when he was a Senior SW Engineer at 3com and a SW Staff Engineer at Conexant. Working at Microsoft as a SW Design Engineer, he was the tech lead for Vehicle Networking involving the Bus and Protocol driver stacks. He took the stacks through the threat modeling and implemented the resolutions in what was released as the Windows Mobile for Automotive (WMfA) platform. At Intel, he was the Content Protection lead and owned the system level architecture of Conditional Access and Trusted Data Path (end-2-end premium content protection within a SoC.) Architecting the security for embedded devices and in his current role as the Principal Engineer, owns the scaling of security (from below Atom to Xeon) and on multiple Operating Systems. He is the subject matter expert for IOTG security across Intel and outside of Intel.
En çok satan kitaplar
Aynı yazar tarafından yazılan bu kitaplara da ilgi duyabilirsiniz.
Sunil Cheruvu is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation and has been involved in architecting complex systems involving HW/FW/SW for almost 23 years. Implementing the code for Baseline Privacy security in DOCSIS compliant Cable Modems when he was a Senior SW Engineer at 3com and a SW Staff Engineer at Conexant. Working at Microsoft as a SW Design Engineer, he was the tech lead for Vehicle Networking involving the Bus and Protocol driver stacks. He took the stacks through the threat modeling and implemented the resolutions in what was released as the Windows Mobile for Automotive (WMfA) platform. At Intel, he was the Content Protection lead and owned the system level architecture of Conditional Access and Trusted Data Path (end-2-end premium content protection within a SoC.) Architecting the security for embedded devices and in his current role as the Principal Engineer, owns the scaling of security (from below Atom to Xeon) and on multiple Operating Systems. He is the subject matter expert for IOTG security across Intel and outside of Intel.
En popüler
Demystifying Internet of Things Security :Successful IoT Device/Edge and Platform Security Deployment
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions