Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
|
|
- Beatrix Sutton
- 8 years ago
- Views:
Transcription
1 Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in der Informationstechnik Technische Universität München Fraunhofer Institut für Angewandte und Integrierte Sicherheit AISEC
2 Content Attack examples on embedded systems Future secure embedded systems Testing embedded systems security Security research in Munich 2
3 ATTACKS ON EMBEDDED SYSTEMS 3
4 FUTURE SECURE EMBEDDED SYSTEMS 12
5 Requirements for future secure embedded systems 1. Security for more than 10 years (target 30 years) 2. Secure machine to machine communication (M2M) 3. Protection of embedded systems against manipulation and misuse 4. Fulfillment of typical non functional requirements, i.e.: Real time behavior Resource limitations (cost, power) 5. Maintain security despite increasing complexity 6. Protection of intellectual property 7. Secure software update during operation 13
6 Secure embedded system M2M SIM GSM other System on Chip ID Actuator ID Sensor Trust Core 1 OS Core 2 IO-interfaces Peripherals Core i Core n RAM Flash System on Chip Hardware Security Module 14
7 Secure embedded system: Chip Identities M2M SIM other System on Chip GSM ID Actuator ID Sensor Trust Core 1 OS Core 2 IO-interfaces Peripherals Core i Core n RAM Flash System on Chip Hardware Security Module 15
8 IDs for Hardware Binding of components Authentication Integrity checking Piracy protection Encryption with derived keys Methods Physical Unclonable Functions (PUF) : fingerprint of a chip Fuses (electric or laser) Flash memory 16
9 PUFs as security primitive Unique Physical Property + Measurement = Method Authentication, Key Generation + = PUF Physical Unclonable Function 17
10 Ring Oscillator PUF (Suh and Devadas, 2007) * Ring oscillator frequencies depend on manufacturing variations Two ROs are compared to obtain a response bit * G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. Design Automation Conference, DAC th ACM/IEEE, pages 9 14,
11 SRAM PUF (Guajardo et al., 2007) * Symmetric circuit balance influenced by manufacturing variations SRAM cells show a random, but stable value after power-up * J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls. FPGA intrinsic PUFs and their use for IP protection. In CHES 2007, volume 4727 of LNCS, pages Springer,
12 Automotive ECUs today and in future Microcontroller Microcontroller NVM Code CPU RAM Code CPU key application PUF key application Embedded Flash 65nm 40nm 28nm???? Flash Encrypted Code/Data Logic Process + external Flash + Shrinkable + Lower Cost + Higher Performance 20
13 Alternatives to PUF based key generation Fuses Electrical Reliability: weak key application Laser Size: very large Security: Easy to identify and modify OTP (one time programmable memory) Cost: comparison with PUF technology open Microcontroller RAM Code Security: memory cells easier to detect, extract and modify Programming of key during test increases test complexity CPU Flash Encrypted Code/Data 21
14 Reliability of PUFs Critical parameters: Temperature Voltage Ageing Countermeasures: Differential measurement Redundancy: Selection of reliable bits (1000 PUF Bits 100 Key Bits) Proper design: Design and design parameters must consider the behavior of temperature and voltage variations as well as ageing (as for any other circuit design) 22
15 Frequency behavior of an oscillator PUF f f Osc 3 Osc 4 instable f Osc 1 Osc 2 good -40 C 25 C 150 C Osc 5 Osc 6 Critical: uniqueness may be compromised 23
16 State of the Art in error correction Encoded Key Bits PUF Response Block Borders PUF Bits: - Reliable 1 - Reliable 0 - Unreliable Helper Data index of selected bit u 1=1 u 2 =? u 3 =3 All error correctors work on fixed block structure: e.g. IBS (Yu and Devadas, 2010 *) Goal: find one white and one black square in each block of four Helper data store the indices of selected bits * M.-D. Yu and S. Devadas, Secure and robust error correction for physical unclonable functions, IEEE Design & Test of Computers, vol. 27, no. 1, pp ,
17 Differential Sequence Coding * Encoded Key Bits PUF Response Helper Data - distance - inversion No fixed block borders Helper data store distance to next bit and an inversion indicator Larger blocks of unreliable bits can be skipped Most efficient error corrector scheme known to date * M. Hiller, M. Weiner, L. Rodrigues Lima, M- Birkner and G. Sigl. Breaking through Fixed PUF Block Limitations with Differential Sequence Coding and Convolutional Codes, TrustED,
18 Secure embedded system: Secure Elements M2M SIM other System on Chip GSM ID Actuator ID Sensor Trust Core 1 OS Core 2 IO-interfaces Peripherals Core i Core n RAM Flash System on Chip Hardware Security Module 27
19 Tasks of Secure Elements Key storage Asymmetric cryptography (signing and encryption) Session key generation Random number generation Access right check Integrity check Attestation Secure data storage Resistance against Hardware attacks! 28
20 Secure Element in a vehicle In BMBF Project SEIS (Sicherheit in eingebetteten IP-basierten Systemen) AISEC integrated a Secure Element in a car. Internet Gateway OEM Server Secure Element 29
21 Secure Element in Smart Meter The BSI Protection Profile requests a Secure Element in the Smart Meter Gateway. Secure Element Source: Protection Profile für das Gateway eines Smart Metering Systems; 30
22 Secure Elements in mobile phones 3 Secure Elements SIM Security Chip Secure SD Card 32
23 TESTING EMBEDDED SYSTEMS SECURITY 36
24 AISEC Labs to test security of systems! Hardware GSM Embedded NFC, Mobile App Test 37
25 Attacks on PUF based key generation All PUFs are vulnerable to HW attacks: Probing/Forcing Fault Attacks Side Channel Attacks Attacking the physical system (ring oscillators frequencies) D. Merli, J. Heyszl, B. Heinz, D. Schuster, F. Stumpf, and G. Sigl. Localized Electromagnetic Analysis of RO PUFs. In Proceedings of Int. Symposium on Hardware-Oriented Security and Trust (HOST), June IEEE. Attacking the key extraction process D. Merli, D. Schuster, F. Stumpf, and G. Sigl. Semi-invasive EM attack on FPGA RO PUFs and countermeasures. In 6th Workshop on Embedded Systems Security (WESS 2011), Taipei, Taiwan, October ACM. D. Merli, F. Stumpf, and G. Sigl. Protecting PUF error correction by codeword masking. Cryptology eprint Archive, Report 2013/334,
26 Ring Oscillator PUF (Suh and Devadas, 2007) * Ring oscillator frequencies depend on manufacturing variations Two ROs are compared to obtain a response bit * G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. Design Automation Conference, DAC th ACM/IEEE, pages 9 14,
27 RO PUF, EM Side-Channel Attack (Merli et al., 2011)* RO frequencies around 100 MHz Identification of RO PUF frequencies through EM side-channel * D. Merli, D. Schuster, F. Stumpf, and G. Sigl. Semi-invasive EM attack on FPGA RO PUFs and countermeasures. In 6th Workshop on Embedded Systems Security (WESS 2011), Taipei, Taiwan, October ACM. 40
28 RO PUF, EM Side-Channel Attack (Merli et al., 2011)* RO_1 RO_2 RO_2 RO_3 RO PUF modelling by EM side-channel of frequency comparisons * D. Merli, D. Schuster, F. Stumpf, and G. Sigl. Semi-invasive EM attack on FPGA RO PUFs and countermeasures. In 6th Workshop on Embedded Systems Security (WESS 2011), Taipei, Taiwan, October ACM. 41
29 Side Channel Analysis: Electromagnetic Analysis 42
30 RO PUF, Localized EM Analysis (Merli et al., 2013)* Separation of Ring Oscillator PUF measurement components possible by EM analysis RO frequency measurement can be observed step by step Full PUF model can be extracted * D. Merli, J. Heyszl, B. Heinz, D. Schuster, F. Stumpf, and G. Sigl. Localized Electromagnetic Analysis of RO PUFs. In Proceedings of Int. Symposium on Hardware-Oriented Security and Trust (HOST), June IEEE. 43
31 Security Research in Munich Industry Fraunhofer Institute for Applied and Integrated Security Claudia Eckert Georg Sigl Industry ~3000 Students TU München Electrical Engineering Georg Sigl TU München Computer Science Claudia Eckert ~3000 Students 46
32 AISEC KEY FIGURES Employees: 2013: current status: > 90 Plans for further growth 2014 > > 150 Financing (Fraunhofer Model) Up to 30% state directly, 70% 3 rd party research projects Fraunhofer
33 AISEC Fields of Expertise Embedded Security Trusted platforms (HW/SW-Co-Design) Hardware Security HSMs, Side-channel, EMA-, Fault-Analysis Product- and Know-How-Protection PUF-solutions, smart materials, Firmware-Protection Mobile Security Trusted BYOD, App-Analysis Tool, Automotive-Sec. IP-based Networks Cloud-Networking, Secure Multi-Party Computation Digital Identity Attribute based IDs, Object-IDs, Web-IDs Fraunhofer
34 Thank You 51
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution
More informationBreaking through Fixed PUF Block Limitations with Differential Sequence Coding and Convolutional Codes 04/11/2013
Matthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner and Georg Sigl Breaking through Fixed PUF Block Limitations with Differential Sequence Coding and Convolutional Codes International
More informationAPPLIED AND INTEGRATED SECURITY
APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München
More informationPUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
More informationApplied and Integrated Security. C. Eckert
Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass
More informationAnti-Counterfeiting with Hardware Intrinsic Security
Anti-Counterfeiting with Hardware Intrinsic Security Vincent van der Leest and Pim Tuyls Intrinsic-ID, Eindhoven, The Netherlands http://www.intrinsic-id.com Abstract Counterfeiting of goods and electronic
More informationCycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
More informationSoftware Hardware Binding with Quiddikey
Software Hardware Binding with Quiddikey Mass scale solution against software piracy Secure your digital life Software-Hardware Binding solutions are typically required for Flash-based systems in which
More informationHardware Intrinsic Security to Protect Value in the Mobile Market
Hardware Intrinsic Security to Protect Value in the Mobile Market Vincent van der Leest Roel Maes Geert-Jan Schrijen Pim Tuyls Intrinsic-ID { vincent.van.der.leest roel.maes geert.jan.schrijen pim.tuyls
More informationLogically Reconfigurable PUFs: Memory-Based Secure Key Storage
Logically Reconfigurable PUFs: Memory-Based Secure Key Storage Ilze Eichhorn Intrinsic-ID High Tech Campus 9 Eindhoven, The Netherlands ilze.eichhorn@ intrinsic-id.com Patrick Koeberl Intel Ireland Collinstown
More informationSecure Hardware PV018 Masaryk University Faculty of Informatics
Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationQuality Limitations on the Extraction of a PUF-based Cryptographic Key
Quality Limitations on the Extraction of a PUF-based Cryptographic Key Sandra L. Lattacher, TECHNIKON Forschungs- und Planungsgesellschaft mbh Joint work with Martin Deutschmann, Michael Höberl, Christina
More informationSecure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems
Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile
More informationPervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
More informationVehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
More informationReviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl chris@flylogic.net nohl@srlabs.de Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
More informationConfidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator
Confidentio Integrated security processing unit Including key management module, encryption engine and random number generator Secure your digital life Confidentio : An integrated security processing unit
More informationDRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification
DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification Daniel E. Holcomb UC Berkeley Mastooreh Salajegheh UMass Amherst Kevin Fu UMass Amherst Amir Rahmati UMass Amherst
More informationSecurity in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationNVM memory: A Critical Design Consideration for IoT Applications
NVM memory: A Critical Design Consideration for IoT Applications Jim Lipman Sidense Corp. Introduction The Internet of Things (IoT), sometimes called the Internet of Everything (IoE), refers to an evolving
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationIndustrie 4.0. Towards a Holistic Approach for Cyber Safety and Security
Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität
More informationLocal Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov
Local Heating Attacks on Flash Memory Devices Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: sps32@cam.ac.uk Introduction Semi-invasive attacks were introduced in 2002 ( Optical fault induction
More informationSPARKS Cybersecurity Technology and the NESCOR Failure Scenarios
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,
More informationCredential Management for Cloud Computing
Credential Management for Cloud Computing Workshop Cloud Security, 16.07.2014 Dr. Johannes Luyken Page 1 Security breaches increase in their impact by exploiting online access to confidential data that
More informationMicrosemi Security Center of Excellence
Microsemi Security Center of Excellence Sales and FAE Training August 24, 2015 1 Outline What is the Security Center of Excellence (SCoE)? Overview of Microsemi s Security capabilities and expertise Threat
More informationCHASE Survey on 6 Most Important Topics in Hardware Security
University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit
More informationWhat is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationRFID Based Real Time Password Authentication System for ATM
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 RFID Based Real Time Password Authentication System for ATM Soniya B. Milmile 1 Prof.
More informationSecurity in the Age of Nanocomputing. Hacking Devices
Security in the Age of Nanocomputing Matthew Tan Creti Hacking Devices The ESA estimates its total worldwide losses due to piracy at $3 billion annually [2] One million unlocked iphones could cost Apple
More informationIoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
More informationInformation Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
More informationSecure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
More informationSecurity testing of hardware product
Alain MERLE CESTI LETI CEA Grenoble Alain.merle@cea.fr Security testing of hardware product DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security testing, Attacks, Evaluations,
More informationERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS
ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda
More informationEmbedding Trust into Cars Secure Software Delivery and Installation
Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationAGAINST OUTSIDE THREATS
SECURING CONTROL NETWORKS AGAINST OUTSIDE THREATS MARK BUCKLAND MAY 2015 2015 Echelon Corporation IzoT PLATFORM PILLARS Full Monitoring and Control over IP Legacy Co-Existence and Evolution Industrial-strength
More informationEVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
More informationProtected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
More informationHardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
More informationM2M For industrial and automotive
M2M For industrial and automotive Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is
More informationWhat is Industrie 4.0
What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2
More informationBus Data Acquisition and Remote Monitoring System Using Gsm & Can
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 8, Issue 3 (Nov. - Dec. 2013), PP 88-92 Bus Data Acquisition and Remote Monitoring System
More informationSecurity testing for hardware product : the security evaluations practice
Alain MERLE CESTI LETI CEA Grenoble Alain.merle@cea.fr Security testing for hardware product : the security evaluations practice DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationHorst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
More informationPUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon Extended Version Stefan Katzenbeisser 1, Ünal Kocabaş 1, Vladimir Rožić 3, Ahmad-Reza Sadeghi
More informationIMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
More informationInternational Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
More informationSupporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
More informationCryptographic Rights Management of FPGA Intellectual Property Cores
Cryptographic Rights Management of FPGA Intellectual Property Cores Tom Kean Algotronix Ltd. PO Box 23116 Edinburgh EH8 8YB United Kingdom tom@algotronix.com ABSTRACT As the capacity of FPGA s increases
More informationProfessor John McCanny CBE FRS FREng
Foundation for Science and Technology-debate How can UK intellectual property be better protected from cyber theft". Professor John McCanny CBE FRS FREng Research Challenges Everyday we create 2.5 quintillion
More informationModeling SRAM Start-Up Behavior for Physical Unclonable Functions
Modeling SRAM Start-Up Behavior for Physical Unclonable Functions Mafalda Cortez Apurva Dargar Said Hamdioui Delft University of Technology Faculty of EE, Mathematics and CS Mekelweg 4, 2628 CD Delft,
More informationRADSAGA Resubmission. First meeting. Steffen MUELLER Alexander KOELPIN. Institute for Electronics Engineering (LTE) University of Erlangen-Nuremberg
RADSAGA Resubmission First meeting Steffen MUELLER Alexander KOELPIN Institute for Electronics Engineering (LTE) University of Erlangen-Nuremberg Outline 1. Introducing LTE 2. RadHard activities 3. LTE
More informationSHE Secure Hardware Extension
SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it
More informationVON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
More informationTrends and Challenges in IT Security. itec08, Darmstadt, 6th Nov. 2008
Trends and Challenges in IT Security Claudia Eckert Fraunhofer Institute for Secure Information Technology SIT Darmstadt, Germany, Darmstadt, 6th Nov. 2008 Outline 1. Internet of smart Things and Services
More informationIntelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationCoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography
CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography 28. Februar 2008 Alexander Klimm, Oliver Sander, Jürgen Becker Institut für Technik der Informationsverarbeitung Sylvain
More informationLightweight and Secure PUF Key Storage Using Limits of Machine Learning
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning Meng-Day (Mandel) Yu 1, David M Raïhi 1, Richard Sowell 1, Srinivas Devadas 2 1 Verayo, Inc., San Jose, CA, USA 2 MIT, Cambridge,
More informationAdvancements in Wireless Access-Control Security. By Vivien Delport Director of Applications. And
Advancements in Wireless Access-Control Security By Vivien Delport Director of Applications And Cristian Toma Applications Engineer Security, Microcontroller & Technology Development Division Microchip
More information90nm e-page Flash for Machine to Machine Applications
90nm e-page Flash for Machine to Machine Applications François Maugain, Jean Devin Microcontrollers, Memories & Secure MCUs Group 90nm e-page Flash for M2M applications Outline M2M Market Cycling Endurance
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationToday. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
More informationAPPLIED AND INTEGRATED SECURITY
APPLIED AND INTEGRATED SECURITY New approach for Compliance, Security and Data privacy assessment in the Cloud Age NGCert Next Generation Certification EuroCloud Forum 2015 Fraunhofer AGENDA Fraunhofer
More informationRFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
More informationHardware Testing and Security Requirements in the Nano Era
Secure Hardware in the Nano Era: Some New Directions Swarup Bhunia T. and A. Schroeder Associate Professor Electrical Engineering and Computer Science March ISQED 2015 1 SoC Security Issues & Protection
More informationSafety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
More informationSecurity Challenges in the Cloud
Security Challenges in the Cloud Claudia Eckert Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Chair for IT Security, TU München 7.2. Darmstadt, Conference of the e-finance
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More informationLab Experiment 1: The LPC 2148 Education Board
Lab Experiment 1: The LPC 2148 Education Board 1 Introduction The aim of this course ECE 425L is to help you understand and utilize the functionalities of ARM7TDMI LPC2148 microcontroller. To do that,
More informationWireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth
More informationMultiViu Flex 7 Data Sheet
Division Interior MultiViu Flex 7 Data Sheet Picture: MultiViu Flex 7 Picture: MultiViu Flex 7 Description CAN-capable multifunction Solution Features: Robust and versatile design CAN-capability (SAE J1939,
More informationSecurity in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More information8-Bit Flash Microcontroller for Smart Cards. AT89SCXXXXA Summary. Features. Description. Complete datasheet available under NDA
Features Compatible with MCS-51 products On-chip Flash Program Memory Endurance: 1,000 Write/Erase Cycles On-chip EEPROM Data Memory Endurance: 100,000 Write/Erase Cycles 512 x 8-bit RAM ISO 7816 I/O Port
More informationProblems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
More informationADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
More informationHardware Security for Trustworthy C2X Applications Marko Wolf
Hardware Security for Trustworthy C2X Applications Marko Wolf C2C-CC/CAMP Harmonization Workshop, Wolfsburg, Germany, 15.3.2012 Outline 1. Three General Reasons for Automotive Hardware Security Modules
More informationA Cost-efficient Building Automation Security Testbed for Educational Purposes
A Cost-efficient Building Automation Security Testbed for Educational Purposes Jaspreet Kaur, Michael Meier, Sebastian Szlósarczyk and Steffen Wendzel Cyber Security Department Fraunhofer Institute for
More informationTest vehicle tool to assess candidate ITSEF s competency
Test vehicle tool to assess candidate ITSEF s competency September 28, 2011 Takayuki TOBITA IT Security Center (ISEC) Information-technology Promotion Agency, JAPAN (IPA) 1 Common Criteria Scheme in Japan
More informationSecure Cloud Storage and Computing Using Reconfigurable Hardware
Secure Cloud Storage and Computing Using Reconfigurable Hardware Victor Costan, Brandon Cho, Srini Devadas Motivation Computing is more cost-efficient in public clouds but what about security? Cloud Applications
More informationMICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY
MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY F. Shawki 1,2, M. El-Shahat. Dessouki 1,3, A. I. Elbasiouny 4, A.N. Almazroui 5, F. M. R. Albeladi 5 1 Assistant Professor, Electrical
More information5G Requirements from M2M / Smart Grid
Technische Universität München Lehrstuhl für Kommunikationsnetze Prof. Dr.-Ing. W. Kellerer 5G Requirements from M2M / Smart Grid Mikhail Vilgelm mikhail.vilgelm@tum.de Wolfgang Kellerer wolfgang.kellerer@tum.de
More informationSerial port interface for microcontroller embedded into integrated power meter
Serial port interface for microcontroller embedded into integrated power meter Mr. Borisav Jovanović, Prof. dr. Predrag Petković, Prof. dr. Milunka Damnjanović, Faculty of Electronic Engineering Nis, Serbia
More informationNAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ
What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to
More informationEnsuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More informationUSER MANUAL V5.0 ST100
GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2
More informationChip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationFigure 1.Block diagram of inventory management system using Proximity sensors.
Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav
More informationOffline HW/SW Authentication for Reconfigurable Platforms
Offline HW/SW Authentication for Reconfigurable Platforms Eric Simpson Virginia Tech esimpson@vt.edu Patrick Schaumont Virginia Tech schaum@vt.edu Abstract Many Field-Programmable Gate Array (FPGA) based
More informationSECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
More informationHardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
More information