How to secure the Internet of Things?
|
|
|
- Everett Hampton
- 9 years ago
- Views:
Transcription
1 How to secure the Internet of Things? Hannes Tschofenig 19 th May
2 Agenda IoT is about optimizing for constrained environments. IoT is not a precise/well-defined concept. I will explain what ARM is focusing on. There are problems with deployed IoT products but there are also solutions. How is ARM contributing to better IoT security? 2
3 3 What is Internet of Things?
4 Recent Example of IoT Announcement Ubuntu Core devices will requires a 600MHz processor with 128MB RAM and a 4GB flash for factory reset and system rollback. Ubuntu Core itself will only take up 40MB RAM leaving the rest for applications. 4
5 ARM Processors in Smartphones ARM Cortex-A family: 5 Applications processors for feature-rich OS and 3rd party applications ARM Cortex-R family: Embedded processors for real-time signal processing, control applications ARM Cortex-M family: Microcontrolleroriented processors for MCU, ASSP, and SoC applications
6 Cortex-M Processors Lowest cost Low power Example: Touchscreen Controller Lowest power Outstanding energy efficiency Example: Sensor node Bluetooth Smart Performance & efficiency Feature rich connectivity Example: Weables, Activity trackers, Wifi receiver Digital Signal Control (DSC)/ Processor with DSP Accelerated SIMD Floating point (FP) Example: Sensor fusion, motor control Maximum Performance Flexible Memory Cache Single & Double Precision FP Examples: Automotive, High-end audio set 6 Processors use the 32-bit RISC architecture
7 Wide Range of Constraints Constrained Node Constrained Networks Text copied from RFC 7228 Terminology for Constrained-Node Networks 7
8 Example: STM32L063C8T6 32bit CORTEX M0+ with max 32 Mhz Flash: 64 KB RAM: 8 KB Datasheet can be found here. Mouser Volume Price , , ,06 8
9 Example: STM32F215RET6 32bit CORTEX M3 with120 Mhz Flash: 512 KB RAM: 128KB Features: Interfaces: CAN, I2C, SPI, UART, USART, USB, Ethernet Camera interface Random number generator, hardware accelleration (AES-128, AES-192, AES-256, Triple DES, MD5, SHA1, HMAC) Real-Time Clock A/D & D/A Converters Temperature sensor Serial wire JTAG debug port Datasheet can be found here. Farnell Volume Price , , , , , , ,62 9
10 Example: STM32F415ZGT6 32bit CORTEX M4 with168 Mhz Flash: 1MB RAM: 192KB Features: Interfaces: CAN, I2C, SPI, UART, USART, USB, Ethernet Camera interface Random number generator, hardware accelleration (AES-128, AES-192, AES-256, Triple DES, MD5, SHA1, HMAC) Real-Time Clock A/D & D/A Converters Temperature sensor Serial wire JTAG debug port Datasheet can be found here and here. Farnell Volume Price , , , , , , ,75 10
11 Example: Board with A-Class Processor CHIP - The World's First Nine Dollar Computer WiFi & Bluetooth Smart built-in Link to Kickstarter project is here. Economies of scale tends to be somewhat counter-intuitive. 11
12 Cost Distribution Reducing total system cost by enabling better system tradeoffs = Total Cost + + Hardware Cost Energy Cost Development Cost (amortized, inc. deployment cost) We care about this. But it can make sense to spend more here (e.g., on flash/ram, CPU, BOM) 12 if it results in savings here (e.g. sophisticated power management) More detailed treatment of this topic in a webinar by Peter Aldworth about How to Select Hardware for Volume IoT Deployments? and here. (e.g. firmware update, manageability)
13 13 Securing Internet of Things
14 The Internet: A Distributed Design Story Examples of Problems Cryptographic Primitives Protocol Specifications and Architecture Implementation Deployment Improved algorithms for integer factorization, too small key size. No end-to-end security, complexity in specifications, insecure authentication protocols Buffer overflow attacks, poor UI or other usability problems, poor choice of hardware Enabled debug ports, missing deployment of security mechanisms Understanding the distributed nature of the development process is essential for tackling security problems. Depending on your role you are a consumer of various technologies and you might be able to influence one or several areas
15 How to Secure IoT? Perform Classical Threat Analysis Following Security Recommendations Learn from Attacks Follow Design Patterns See IETF#92 plenary talk with Dave Thaler and Mary Barnes (Internet Architecture Board)
16 Learn from Attacks Selected attacks to illustrate common problems: Limited software update mechanism Missing key management Inappropriate access control Missing communication security Vulnerability to physical attacks Looking at real-world attacks allows us to easily see the need for security (and to convince others like management -- to do something). Don t forget to secure the mobile/cloud interfaces as well, as discussed in the Open Web Application Security Project (OWASP) Internet of Things Top * list. 16 (*) Note: OWASP might be biased in their assessment since the organization deals mostly with Web-based vulnerabilities. 16
17 Limited Software Update Mechanism In January 2014 Bruce Schneier published an article where he expresses concerns about the lack of software update mechanisms in IoT deployments. In a presentation at the Chaos Communication Congress in December 2014 a security vulnerability of devices implementing the TR69 protocol, which also provides a software update mechanism, was disclosed. Real problem: Fix released in 2005 by AllegroSoft already but has not been distributed along the value chain of chip manufacturers, gateway manufacturers, Internet service providers. What happens when vendors do not support certain products anymore? Do IoT devices need a time-to-die / shelf-life? 17 17
18 Missing Key Management Problem Example: LIFX - Internet connected light bulb The attack revealed that an AES key shared among all devices to simplify key management. The firmware image was extracted via JTAG using a Bus Blaster. Then, the firmware was analyzed using IDA Pro. Mistakes only made by startups? See BMW ConnectedDrive 18 Pictures taken from h1p://contex6s.co.uk/resources/blog/hacking- internet- connected- light- bulbs 18
19 Inappropriate Access Control Insecure default settings have caused problems with Insteon LED Bulbs, as reported in When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet Insteon LED Bulbs To find IoT devices connected to the Internet global scans have been used, for example, using ZMap. Similar problems have been seen with various other appliances, such as surveillance cameras, baby monitoring cameras and gas stations. Lacking access control to configuration files can cause problems for the entire system, as demonstrated with attacks against industrial control systems
20 Missing Communication Security In Green Lights Forever: Analyzing the Security of Traffic Infrastructure Ghena,et al. analyzed the security of the traffic infrastructure. Results: The wireless connections are unencrypted and the radios use factory default usernames and passwords. All of the settings on the controller may be configured via the physical interface on the controller, but they may also be modified though the network. An FTP connection to the device allows access to a writable configuration database. This requires a username and password, but they are fixed to default values which are published online by the manufacturer. A similar attack also exploited the unencrypted communication. I even tested the attack launched from a drone flying at over 650 feet, and it worked! 20 20
21 Vulnerability to Physical Attacks Physical access to IoT devices introduces a wide range of additional attack possibilities. In some cases it might be necessary to extract keys contained on chip. This can be accomplished using power analysis, or fault injection (glitching) attacks. Tools for physical attacks decrease in cost and become easier to use. Important to keep these attacks in mind since we will see more of them in the future. JTAGulator Chip Whisperer 21 21
22 Not all hacks are security attacks Example: irobot Create 2 22 The 2007 release Create was a closed system and researchers hacked it to use it for educational purposes. Create 2 is the programmable version. Many border-line cases: Nest devices at and Remotely controlling cars using wireless dongles: Hacking a toaster: Hacking your printer:
23 Learn from Attacks, cont. Integrate a software update mechanism and leave enough head room. Use modern operating system concepts to avoid system-wide compromise due to a single software bug. Use an automated key management protocol with proper authentication and authorization (access control). Threat analysis must take physical attacks into account. Use Internet security protocols offering communication security. Take security into account during the software development lifecycle and in the deployment phase
24 Remarks Internet of Things security today is like PC security 20 years ago. Most attacks on consumer-oriented IoT systems fall under the script kiddie category. For industrial control systems many attacks are already scary (see DragonFly, and attack against German steel factory). Risk analysis is often complex since hacked devices may be used for further attacks. Hence, indirect consequences also need to be taken into account. Examples: DDoS attacks using SNMP (used in printers), hacked Femto home router used for spying 24 24
25 25 How is ARM contributing to a more secure IoT?
26 Mbed Today 70,000+ developers 8+ years of IoT products 9,000+ projects 5+ years 24/7 1M+ builds/year 30+ official mbed boards 26 Go to
27 mbed Ecosystem Partners Developers Enabled Services Enabled Products mbed Device Server Freemium model to enable startups Application data and device management Growth market access for cloud platforms and operators mbed OS Free for use on ARM architecture Leading connectivity standards Productivity, minimized costs Built-in management Security ARM Cortex -M -based MCU 27
28 Lifecycle Security Directory and Subscription Security, Admin and Multi-tenancy Data Flow Management RESTful and Publish/Subscribe Device Management Lightweight M2M (LWM2M) Communication Security mbed Device Interface Open Web Standards Application Transfer Protocols CoAP, HTTP, MQTT mbed TLS mbed Device Server IPv4 IPv6, 6LoWPAN mbed TLS Device Management: LWM2M Device Security Cryptobox mbed OS 28
29 Traditional MCU Flat Security Model IoT devices include significant software complexity Server With flat security all code/data lives in a shared address space Bugs in any code can lead to a security flaw Application Protocol BLE Stack SSL Library WiFi Stack Diagnose Secure Storage Device Management Secure ID Crypto API Crypto Keys Firmware Update RNG 29
30 Device Security: Secure Partitioning for MCUs Server Split memory into private critical and public uncritical Small private footprint simplifies code analysis Public code never sees keys/secrets Vulnerabilities on public side can t affect private side Private side can verify integrity of the public side Public code can t write code directly to Flash Private side can reliably recover device to clean state Public BLE Stack WiFi Stack Application Protocol SSL Library Device Management Private Firmware Update Secure Storage Crypto Keys Crypto API Secure ID RNG Diagnose 30
31 Security Services in mbed OS : μvisor The ARM Cortex-M CPU Architecture enforces access privileges The Memory Protection Unit (MPU) enforces CPU memory partitioning Low latency, efficient, transitions (incl. interrupts) Designed so that transitions are infrequent Generally low overhead in system Performance, memory, power, developer Software mbed OS and User Application [Public code/data] Cryptobox Security Services [Private code/data] μvisor [Privileged] Hardware ARM Cortex-M CPU [privilege enforcement] ARM Cortex-M MPU [partition enforcement] Memory/Peripherals (SRAM; Flash; DMA; Crypto HW) 31
32 Security Services in mbed OS: Key Storage; Crypto; RNG Un-cloneable device identity Key and certificate storage Protection of server API tokens Supporting mbed TLS code (and APIs to corresponding HW features) Cryptographic algorithms Random number generation 32
33 Security Services in mbed OS: Agile Security Software is never finished New features, bug fixes, patching vulnerabilities and tracking standards Flash update security layer prevents storage of unsigned code Managed via mbed Device Server Fully secured and integrity checked within device Firmware Over The Air (FOTA) enables agile security Patch vulnerabilities Move to new (stronger) crypto algorithms 33
34 Lifecycle Security and OMA LWM2M Device Identity and config. for Bootstrap Assign devices to a particular owner and service vendor Manufacturing Support Registered with service and ready to use Bootstrap Support Device Support (for a specific IoT service vendor) FOTA update extends device lifetime Device requests credentials and configuration for service Distribution Factory 34 Setup Delivery Usage Update Recovery Usage Can choose to reassign device to new service or owner Re-provisioning
35 Lifecycle Security: Enabled with mbed Device Server Security Administration Provides management of security material via a User Interface or API Population of endpoint X.509 certificates Management of black list Web Interface Security TLS-based HTTPs transport with certificates Device Interface Security DTLS-based CoAP transport mbed OS Device X.509 certificate mode (TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8) 35
36 Summary Very few developers have strong security experience (or are event Internet protocol specialists). mbed aims to make it easier for developers to accomplish their goals. Offers operating systems Internet Protocol stack Comprehensive security foundation Ongoing standardization efforts (such as IETF ACE or Thread). 36
ARM mbed IoT Device Platform. November 3 rd, 2014
ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the
Architectural Considerations in Smart Object Networking IAB RFC 7452. Dave Thaler Hannes Tschofenig Mary Barnes (moderator)
Architectural Considerations in Smart Object Networking IAB RFC 7452 Dave Thaler Hannes Tschofenig Mary Barnes (moderator) 1 Note: Slide contains embedded links and, depending how you view this slide deck,
The Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015
The Future of IoT Zach Shelby VP Marketing, IoT Feb 3 rd, 2015 1 Internet of (really nerdy) People 1980s 2 Internet of (content silo) People 1990s 3 Internet of (Web) People 2000s 4 Internet of (really
Driving Embedded Innovation with ARM Ecosystem
Driving Embedded Innovation with ARM Ecosystem (Lauterbach Experts Forum, August 2015) Lifeng Geng Embedded Marketing Manager 1 ARM: The World s Most Scalable Architecture ARM ecosystem meets needs of
Secure, Efficient, and Open Standard Internet of Things
Secure, Efficient, and Open Standard Internet of Things Zach Shelby Director of Technology, IoT ARM acknowledges the trademarks and copyrights of 3 rd parties included in this presentation What is the
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015
Performance Investigations Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 1 Motivation In we tried to provide guidance for the use of DTLS (TLS) when used in
Mobile and Embedded/IoT market Overview and Trends. June 2014
Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum
ZigBee Technology Overview
ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification
The Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
STM32 F-2 series High-performance Cortex-M3 MCUs
STM32 F-2 series High-performance Cortex-M3 MCUs STMicroelectronics 32-bit microcontrollers, 120 MHz/150 DMIPS with ART Accelerator TM and advanced peripherals www.st.com/mcu STM32 F-2 series The STM32
Internet of Things. Opportunities for device differentiation
Internet of Things Opportunities for device differentiation What is the Internet of Things? The Internet of Things (IoT) is an emerging market trend impacting semiconductor devices, system OEMs, cloud
Making Sense of Internet of Things Protocols and Implementations
Making Sense of Internet of Things Protocols and Implementations Author: Kim Rowe, RoweBots Higher level protocols for Internet of Things have various features and offer different capabilities. Most of
Reducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
Thingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
Which ARM Cortex Core Is Right for Your Application: A, R or M?
Which ARM Cortex Core Is Right for Your Application: A, R or M? Introduction The ARM Cortex series of cores encompasses a very wide range of scalable performance options offering designers a great deal
System-on-a-Chip with Security Modules for Network Home Electric Appliances
System-on-a-Chip with Security Modules for Network Home Electric Appliances V Hiroyuki Fujiyama (Manuscript received November 29, 2005) Home electric appliances connected to the Internet and other networks
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
Design for Success: Designing for the Internet of Things with TiWiConnect
Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Questions from The New SensorTag - IoT Made Easy Webinar
Questions from The New SensorTag - IoT Made Easy Webinar Are there any plans to make a Windows API available (preferably portable for use in Windows 10 Universal applications) It is in our queue of projects,
ARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM
ARM Processors and the Internet of Things Joseph Yiu Senior Embedded Technology Specialist, ARM 1 Internet of Things is a very Diverse Market Human interface Location aware MEMS sensors Smart homes Security,
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.
W ith an estimated 14 billion devices connected to
Renesas Synergy Security Portfolio Delivers Comprehensive Protection from Industrial and IoT Threats Advanced capabilities give developers tools to counter attacks W ith an estimated 14 billion devices
FLYPORT Wi-Fi 802.11G
FLYPORT Wi-Fi 802.11G System on module 802.11g WIFI - Infrastructure mode - softap mode - Ad hoc mode Microchip PIC 24F 16 bit processor Microchip MRF24WG0MA/MB - Native WiFi 802.11g transceiver - PCB
Atmel Crypto Elements. 2015 Atmel Corporation
Atmel Crypto Elements 1 2015 Atmel Corporation What about Security 2 2015 Atmel Corporation Security Attacks in the News Can Atmel Help? YES! LIFX: Networked LED lamps betrayed Wi-Fi passwords 07/22/2014
Migrating Application Code from ARM Cortex-M4 to Cortex-M7 Processors
Migrating Application Code from ARM Cortex-M4 to Cortex-M7 Processors Joseph Yiu and Robert Boys January 2015 Version 1.1 The latest version of this document is here: /appnotes/docs/apnt_270.asp 1 Cortex
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
Key requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
AdRadionet to IBM Bluemix Connectivity Quickstart User Guide
AdRadionet to IBM Bluemix Connectivity Quickstart User Guide Platform: EV-ADRN-WSN-1Z Evaluation Kit, AdRadionet-to-IBM-Bluemix-Connectivity January 20, 2015 Table of Contents Introduction... 3 Things
Complete Integrated Development Platform. 2013 Copyright Atmel Corporation
Complete Integrated Development Platform 2013 Copyright Atmel Corporation MCU Developer s Challenge 80% increase in SW in next MCU project Top Engineering Concern: Hitting Schedules More complex end user
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
DesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC
Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices
Adding WiFi to Your Embedded System. WPG Americas & Gainspan Titus Wandinger (WPG) & Su Li (Gainspan) April 23, 2013
Adding WiFi to Your Embedded System WPG Americas & Gainspan Titus Wandinger (WPG) & Su Li (Gainspan) April 23, 2013 Your partners for Embedded Wi-Fi Multi Market Leader 32 bit ARM MCU Leader Ultra low
AppliedMicro Trusted Management Module
AppliedMicro Trusted Management Module Majid Bemanian, Sr. Director of Marketing, Applied Micro Processor Business Unit July 12, 2011 Celebrating 20 th Anniversary of Power Architecture 1 AppliedMicro
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
M85 OpenCPU Solution Presentation
M85 OpenCPU Solution Presentation 2013/09/22 Wireless Solutions Co., Ltd. All rights reserved OUTLINE OpenCPU Summary Advantages Software Architecture What s New? Open Resources Development Requirements
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
7a. System-on-chip design and prototyping platforms
7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit
Web of Things Architecture
Web of Things Architecture 1. Introduction This document is an explanation about the architecture of Web Of Things (WoT). The purpose of this document is to provide (a) a guideline of the mapping between
Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22. www.dragino.com
Yun Shield User Manual VERSION: 1.0 Version Description Date 0.1 Initiate 2014-Jun-21 1.0 Release 2014-Jul-08 Yun Shield User Manual 1 / 22 Index: 1 Introduction... 3 1.1 What is Yun Shield... 3 1.2 Specifications...
WIND RIVER INTELLIGENT DEVICE PLATFORM XT
WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but
Gerard Fianen. Copyright 2014 Cypherbridge Systems LLC [email protected]. Page 1
Securing the Internet of Things Gerard Fianen Copyright 2014 Cypherbridge Systems LLC [email protected] Page 1 INDES-IDS BV - Embedded Software Development The choice of professionals [email protected]
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M. Duncan Purves Connect2 Systems [email protected] http:connect2.
Device Management for Internet of Things Constrained Devices OMA Lightweight M2M Duncan Purves Connect2 Systems [email protected] http:connect2.io Why do we need Remote Device Management? The devices
System Design Issues in Embedded Processing
System Design Issues in Embedded Processing 9/16/10 Jacob Borgeson 1 Agenda What does TI do? From MCU to MPU to DSP: What are some trends? Design Challenges Tools to Help 2 TI - the complete system The
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Network connectivity controllers
Network connectivity controllers High performance connectivity solutions Factory Automation The hostile environment of many factories can have a significant impact on the life expectancy of PCs, and industrially
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
The new 32-bit MSP432 MCU platform from Texas
Technology Trend MSP432 TM microcontrollers: Bringing high performance to low-power applications The new 32-bit MSP432 MCU platform from Texas Instruments leverages its more than 20 years of lowpower leadership
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco
An introduction to nxpusblib. March 2012
An introduction to nxpusblib March 2012 Agenda NXP USB portfolio Demo using LPC1800- Out of the Box What is nxpusblib? How to use nxpusblib? Why to use nxpusblib? Summary 2 NXP USB Portfolio NXP MCU the
2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics
ARTIK TM The Ultimate Platform Solution for IoT 2015. 9. 17 MyungKoo Kang (VP) Samsung Electronics Future Changes from IoT Privacy in the Web Security in SmartGrill 2 IoT Market Forecast ($T) 7 6 5 4 3
Internet of Things based approach to Agriculture Monitoring
Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
A New Approach to IoT Security
A New Approach to IoT Security 5 Key Requirements to Securing IoT Communications The Internet of Things promises to bring everything from microwaves to pacemakers and shipping fleets online, leverage enormous
QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features
Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
CARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO [email protected] @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network
u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End
Embedded Development Tools
Embedded Development Tools Software Development Tools by ARM ARM tools enable developers to get the best from their ARM technology-based systems. Whether implementing an ARM processor-based SoC, writing
WiPG Presentation Gateway
WiPG Presentation Gateway Deployment Guide For more information www.wepresentwifi.com Sales: [email protected] Support: [email protected] wepresent 2015 Contents Introduction 1 User Experience
APx4 Wireless System-on-Module 5/8/2013 1
APx4 Wireless System-on-Module 5/8/2013 1 Table of Contents Key Features Benefits APx4 Software APx4 Development Kit Certifications Use Cases Summary 5/8/2013 2 Key Features APx4 is a computing platform
Implementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
What marketing won t tell you about the Internet of Things
What marketing won t tell you about the Internet of Things Elecia White #eelive Produced by EE Times Why are you here? Why am I here? Founder of Logical Elegance, embedded systems consulting firm Author
OMAP platform security features
SWPT008 - July 2003 White Paper OMAP platform security features By Harini Sundaresan Applications Engineer, OMAP Security Texas Instruments, Wireless Terminal Business Unit This white paper introduces
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Microcontrollers Deserve Protection Too
Microcontrollers Deserve Protection Too Amit Levy with: Michael Andersen, Tom Bauer, Sergio Benitez, Bradford Campbell, David Culler, Prabal Dutta, Philip Levis, Pat Pannuto, Laurynas Riliskis Microcontrollers
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
I vantaggi dell?utilizzo di JAVA nella strategia M2M
1 I vantaggi dell?utilizzo di JAVA nella strategia M2M Giampaolo SANTARSIERO Oracle ISV/OEM Presales Italy 2 Internet of Things: The Next Horizon Needs a Device to Data Centre platform 3 Device to Data
ARM Cortex -A8 SBC with MIPI CSI Camera and Spartan -6 FPGA SBC1654
ARM Cortex -A8 SBC with MIPI CSI Camera and Spartan -6 FPGA SBC1654 Features ARM Cortex-A8 processor, 800MHz Xilinx Spartan-6 FPGA expands vision processing capabilities Dual MIPI CSI-2 CMOS camera ports,
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
Bluetooth 4.0 Solutions for Apple ios Devices. Bluegiga Technologies
Bluetooth 4.0 Solutions for Apple ios Devices Bluegiga Technologies Agenda Introduction How to build Bluetooth 4.0 applications Compatible Bluegiga products What is Bluetooth low energy? Summary Introduction
365 Cloud Storage. Security Brief
365 Cloud Storage Security Brief Overview Surveys reveal time and again that security and data protection concerns are the top barriers to Cloud adoption. At, we take these concerns seriously and have
NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China
NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home
World-wide University Program
1 World-wide University Program Preparing Today s Students for Tomorrow s Technology Joe Bungo Manager Americas/Europe R&D Division 2 CONFIDENTIAL ARM Ltd ARM founded in November 1990 Advanced RISC Machines
M2M, IoT, DEVICE MANAGEMENT: ONE PROTOCOL TO RULE THEM ALL? Julien Vermillard, Sierra Wireless
M2M, IoT, DEVICE MANAGEMENT: ONE PROTOCOL TO RULE THEM ALL? Julien Vermillard, Sierra Wireless Software Engineer at Sierra Wireless, implementing various protocols for AirVantage cloud service. Apache
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
