Accompanying the trade fair, the embedded world Conference (March 9-11, 2025) bundles industry expertise on embedded systems technology. Presentations and discussion panels will be offered on the following key topics:
- oT and connectivity: topics such as the intelligent IoT, OPC UA use cases, vehicle networks, localization and shipment tracking, mobile IoT (5G and 6G) or IoT security management will be discussed here.
- Embedded operating systems: In this series, visitors can find out, for example, about developing with Zephyr, Zephyr for security applications, developing with embedded Linux or optimizing embedded OS.
- Security: The wide-ranging program includes trusted embedded devices, the implementation of the Cyber Resilience Act (CRA), security in the quantum age, the path to secure AI, efficient engineering of safety/security projects and the qualification of secure embedded systems.
- Hardware design: Here, the audience will learn about CPUs and coprocessors, multiprocessor system design, MIPI interfaces, the RISC-V development ecosystem or the development of embedded hardware.
- Software and system engineering: In this series, interested parties can find out about programming languages (C++ or Rust?), open source software, development processes for SW-defined vehicles (SDV), static code analysis and the use of AI for development.
- embedded vision: This session will cover topics such as MIPI for embedded vision, AI in embedded vision applications and embedded vision interfaces.
- Edge AI: This session will cover important topics such as legal compliance of AI systems, AI-supported workflow automation, strategies for building edge AI as well as hardware and frameworks for edge AI. Case studies will also be presented.
Session 'Trustworthy Embedded Devices'
Nils Abartus, emproof (Image: emproof)The rich conference program also includes a session on trustworthy embedded systems (Tuesday, March 11, 11:00-12:45).
- Benjamin Baratte, STMicroelectronics, points out the importance of brand protection and consumer security and considers how identification and authentication of devices can be improved - with digital and physical methods.
- Dr. Martin Neumann, infoteam Software, warns that supply chain attacks could be one of the top five cyber threats by 2040 - for example, if companies are targeted by attacks on individual suppliers. Dr. Neumann will show which strategies small, medium-sized and large companies should pursue and what effective risk management can look like.
- Nils Albartus, emproof, will also address the question of how potential attackers can exploit embedded systems and the gateways offered by software reverse engineering. He provides an overview of the tools of the trade used by attackers, such as the NSA software Ghidra, which can be used for attacks. But defenses are also available, including advanced binary rewriting techniques for software protection.