Introduction Page 4. Inspector SCA Page 6. Inspector FI Page 10. Service & Product support Page 13. Inspector Hardware Matrix Page 14
|
|
|
- Ruby Harrell
- 9 years ago
- Views:
Transcription
1 inspector
2 Introduction Page 4 Inspector SCA Page 6 Inspector FI Page 10 Service & Product support Page 13 Inspector Hardware Matrix Page 14
3 Riscure Riscure is an independent security test laboratory specialising in security testing of products based on smart card and embedded technology. Riscure s specialists work with industry leaders worldwide to create products that require strong security to operate safely in a hostile environment. Riscure was amongst the first to apply side channel analysis techniques to smart cards, and pioneered Differential Power Analysis attack techniques. We support security evalu ation laboratories, go vernment agencies, manufacturers, and card issuers by conducting security eva - luations and by providing and maintaining the Inspector Side Channel Test Tool. Riscure is an EMVco-accredited security evaluation laboratory. 3
4 Inspector is an advanced integrated tool for side channel analysis and fault injection. Designed to meet the highest standards of security research teams, certification labs and businesses around the world, Inspector excels in time-efficient analysis and perturbation of evaluation targets with the latest attack techniques and methods. Inspector is open for extension and modification, user-friendly, and designed for accuracy and reliability, guaranteeing clear and reproducible results. Over the past decade, unintentional data leakage and program flow manipulation through side channels have emerged as methods for attackers to retrieve secrets or perform other unauthorised actions. Traditional attack methods can be costly in terms of knowledge, time, and computing power. Side channel attacks on the other hand can be more easily mounted and are non-invasive as they observe or manipulate physical properties available during normal operation. By using statistical methods on side channel measurements, or by injecting faults into a secure chip, an attacker can gain access to its secrets within a matter of hours. High flexibility, strong capabilities 4
5 Inspector SCA with Power Tracer, EM Probe Station, icwaves, CleanWave and Current Probe. Signal processing functions can be applied real-time during data acquisition With over 5,000 million smart cards being issued every year, and embedded cryptographic technologies emerging in new markets, there is a growing need for security to protect business models and privacy. Cryptographic protection of sensitive data in hostile environments is vital to safeguard intellectual property and business models, user privacy and safety, and regulatory or statutory compliance. Inspector provides test and research labs as well as manufacturers with a highly efficient means of identifying threats in the implementation of a security model. Inspector supports side channel analysis methods such as power, timing, radio frequency, and electromagnetic analysis, and perturbation attacks such as voltage glitching, clock glitching, and laser manipulation. Inspector features built-in support for numerous cryptographic algorithms, application protocols, interfaces, and measuring devices. Inspector can be extended by using the integrated development environment or Eclipse. Inspector lets you easily develop and research new test techniques and test proprietary implementations. Mature testing tool Inspector has become the side channel and fault injection test tool of choice for many organisations around the world including government agencies, manufacturers and commercial laboratories. With a broad user base in North America, Europe and Asia, Inspector is a mature solution that offers the best possible means of determining a device s side channel security and fault resistance. Key features Single integrated tool for side channel analysis and fault injection testing Inspector meets the side channel test requirements of Common Criteria, EMVco, and CMVP certifications Open environment includes source code of modules, allowing existing techniques to be modified and new test methods to be developed from within Inspector Stable and mature, tightly integrated software and hardware enables highspeed acquisition of millions of traces Comprehensive tutorials with configurable training test objects, up-to-date user documentation, and training programs Six-month software release cycle keeps users up-to-date about the latest side channel test techniques in the field Service contract provides access to a dedicated support desk 5
6 Inspector is released in different versions to suit different testing needs. All variants use the same core software, which can be used separately or integrated in a single multifunctional platform. Inspector SCA offers complete side channel analysis functionality Inspector FI offers complete fault injection functionality (perturbation attacks) as well as Differential Fault Analysis (DFA) Inspector Core and SP Signal Processing offers basic SCA functionality, cut to size to provide an accessible software package suitable for acquisition or post-processing. Different needs, same platform Inspector SCA Inspector SCA Side Channel Analysis offers all the necessary options to conduct side channel analysis, such as DPA and EMA. Different hardware components address the form factors that we nowadays find in highsecurity products: contact smart cards, contactless smart cards, and crypto processors in embedded technology. Once the measurements have been taken, a wide variety of signal processing methods is available to establish a high signal and low noise trace set. The signal processing features are designed to deal with the subtle differences between the signal processing of an electromagnetic trace, a power trace, and an RF trace. Inspector s strong graphical trace representation enables users to perform timing analysis or trace inspection on e.g. SPA vulnerabilities. Performing DPA on an ECC implementation With many secure implementations nowadays being SPA-resistant, the focus of testing typically lies on differential test methods (i.e. DPA/ CPA). For this purpose Inspector offers an extensive set of configurable methods covering a large number of cryptographic algorithms, and such established algorithms as (3)DES, AES, RSA, and ECC. The EMA capabilities of Inspector take an important place in our security evaluations for our customers of secure system-on-chip technologies that are deployed in embedded devices. Job de Haas, Director Embedded Technology 6
7 Key features EM emanations of a chip to find the best location to perform DEMA Single solution for power (SPA/DPA/CPA), electromagnetic (SEMA/DEMA/EMA-RF), and contactless (RFA) testing methods Fast analysis and processing using application-specific custom measuring hardware Time-efficient thanks to automated real-time signal processing during data acquisition Tight oscilloscope integration for full acquisition settings configuration from within Inspector, significantly boosting acquisition speed Advanced alignment methods to overcome clock jitter and randomisation countermeasures Highly configurable cryptanalysis modules supporting first-order and highorder attacks on all major algorithms such as (3)DES, AES, RSA and ECC Extensive region-specific algorithm support includes SEED, MISTY1, DSA and Camellia among others Hardware In addition to a PC workstation, Inspector SCA uses hardware optimised for side channel data and signal acquisition. Power Tracer EM Probe Station CleanWave Oscilloscope MP300 Current Probe Power Tracer for SPA/DPA/CPA on smartcards EM Probe Station for SEMA/DEMA/EMA RF Current Probe for SPA/DPA/CPA on embedded devices CleanWave with Micropross MP300 TCL1/2 for RFA and EMA-RF LeCroy WaveRunner 104Xi-A or IVIcompatible oscilloscope GUI 1. Aquisition 2. Signal Processing 3. Cryptanalysis Trigger control Oscilloscope control Test object control Real-time signal processing Edit Filtering Spectrum Statistics Alignment Correlation Leakage characteristics SPA, DPA, CPA 2nd and high order DES, AES, RSA, ECC The target under evaluation will often dictate the measuring, triggering, and control hardware needed to perform SCA. Inspector s flexible hardware manager, open development environment, and broad interfacing options provide a solid foundation for high-quality measurements using custom hardware. Integrated Development Environment (IDE) Inspector SCA 7
8 John Connor, Principal Security Engineer from INSIDE Secure says: Inspector has revolutionized the way we evaluate our products DPA resistance. Its strength lies in the way it in tegrates the acquisition and analysis processes allowing us to quickly determine the effectiveness of new cryptographic hardware designs. Further, its excellent graphical interface allows the user to visualise the power signatures of discrete acquisitions individually or simultaneously - invaluable when preparing data for DPA during an attack while its powerful analysis libraries support most commercially used encryption algorithms. With comprehensive software updates and technical support from Riscure it helps us keep our products secure.
9 inspector
10 Inspector FI Inspector FI Fault Injection offers a comprehensive set of features to perform fault injection testing on smart card technology and embedded devices. Supported test methods include clock glitching, voltage glitching, and optical attacks with purpose-built laser equipment. Fault injection attacks also known as perturbation attacks change the behaviour of a chip by inducing an exploitable fault. With Inspector FI users can test whether they can extract a key by inducing faults in a chip s cryptographic operations, bypass a check such as an authentication or a lifecycle state, or change the program flow on a chip. Extensive configuration options Inspector FI includes highly customisable software-controlled trigger and perturbation parameters such as glitch and pulse length, pulse repetition, and voltage level. The software presents the results by showing expected behaviour, card resets, and unexpected behaviour, along with a detailed log. DFA attack modules are available for major encryption algorithms. Using a wizard, users can also create a custom perturbation program with the API. Key features Unparalleled and easily reproduced accuracy and timing for all glitching hardware Design attack scenarios using a powerful instruction set and Inspector s integrated IDE Extensive configuration options from Inspector to automate fault injection testing Back- and front-side multi-glitching laser equipment, custom-designed for fault injection testing DFA modules for implementations of popular encryption algorithms, including RSA, AES, and 3DES Multi-location laser upgrade provides the option to target multiple locations at once. Operation-dependent timing using icwaves to defeat countermeasures and prevent sample loss 10
11 Testing the effectiveness of countermeasures is essential when improving the security design of a product Hardware Inspector FI can be used with the following hardware components to perform attacks: VC Glitcher with optional Glitch Amplifier Diode Laser Station with optional Multi-Area upgrade PicoScope 5203 or IVI-compatible oscilloscope The VC Glitcher forms the core of Inspector s fault injection architecture. Using ultra-fast FPGA technology, it can generate faults that are only two nanoseconds long. The hardware features a user-friendly programming interface. The glitch program created by the user is loaded on the FPGA before a test run. The VC Glitcher includes integrated circuitry for performing voltage and clock glitching, and an output channel for controlling the Diode Laser Station. The Diode Laser Station consists of a special set of powerful diode lasers with custom-designed optics controlled by the fast and flexible VC Glitcher. The equipment takes optical testing to a new level by offering effective multi-glitching, precise power control, and fast and predictable response to trigger pulses. With the Multi-Area Diode Laser Station upgrade multiple area s on the chip can be target using different timing and power parameters. Waveform-based triggering using icwaves Clock jitter, random process interrupts, and datadependent process duration require flexible triggering of fault injection and side channel acquisition. Inspector s icwaves component generates a trigger pulse in response to the real-time detection of a distinctive pattern in a chip s power or EM signal. The device includes a special narrow band-pass filter to enable the detection of matching patterns even in noisy signals. The reference trace used for the pattern match inside this FPGA-based device can be modified using Inspector s signal processing features. A smart card detecting a fault injection may initiate a protection mechanism to delete secret data or mute the card. The icwaves component can also be used to trigger the powering down of a card whenever the power or EM profile deviates from the standard operation. Efficiency and thoroughness are the cornerstones of our design philosophy. Inspector enables us to perform high-end security evaluations on the one hand and train engineering staff on the other hand. Marc Witteman, Chief Technology Officer Inspector FI with VC Glitcher, icwaves, Glitch Amplifier and Diode Laser Station. 11
12 Diode Laser Station with Multi-Area upgrade option. Diode Laser Station (DLS) with Microscope and XY Stage Inspector combines fault injection and side channel analysis techniques in one high-end package Oscilloscope Glitch Amplifier VC Glitcher Diode Laser Station Integrated development environment (IDE) The development environment in Inspector is designed to offer maximum flexibility to the user, allowing SCA and FI on any target. Open API: Facilitates the implementation of new modules Source code: Each module is supplied with its source code so modules can be tailored as required or used as starting points for new modules GUI 1. Hardware control 2. Perturbation 3. DFA icwaves control Test object control Oscilloscope control Glitch parameters Logging Visualisation Analysis FI instruction set DES AES RSA Integrated Development Environment (IDE) Inspector FI 12
13 Service & Product support User training Inspector SCA and Inspector FI include a multi-day training course by two Riscure side channel specialists. Participants gain handson experience with Inspector and perform tests on training chips. Depending on the options purchased, a subset of the following topics is covered: Introduction to side channel analysis and fault injection methodology Inspector functions and user interface Hardware components Signal processing features Cryptanalysis on common algorithms (SPA, DPA, CPA) Perturbation attacks and DFA Tuning modules and developing new techniques Step-by-step analysis of training chips State of the art Internal R&D and feedback from our customers are used to ensure that Inspector remains a state-of-the-art product. Our specialists use Inspector to perform side channel evaluations for customers all over the world. Riscure is an EMVco-accredited security evaluation laboratory. By using and evaluating Inspector on a daily basis, we make sure that our product always incorporates the latest side channel test techniques. Service contract The field of side channel attacks is rapidly evolving, with new research results being published every year, are gaining popularity or made obligatory by certification schemes and standards. Inspector enables users to stay up-to-date about developments via regular software updates that implement new techniques. The Inspector service contract includes: Annual user workshop Customers are invited to attend the annual two-day technical workshop. At the workshop, which takes place in the Netherlands, we present the latest developments in the field of side channel attacks. New and updated Inspector features are also presented and discussed, as is our product development road map. During the workshop, users can share their Inspector experiences with others. Visit our web site to find out the date and topics for our next workshop. Did you know that with inspector: You stay up-to-date about the latest side channel test techniques You use measurement hardware optimised for crypto processors You work with a test tool used by EMVco- and Common Criteriaaccredited laboratories You optimise your R&D thanks to the integrated development environment You receive an excellent Return on Investment with improved efficiency and a short learning curve More information For more information about Inspector, please contact us by phone at +31 (0) or by at [email protected]. Detailed information about Inspector components can be found at inspector. Software updates with new forms of attack, features, and improvements Annual Inspector User Workshop with the latest developments in the field Technical support from our help desk 13
14 Inspector Hardware Matrix Side Channel Analysis Fault Injection Power Electromagnetic Radio Frequency Power Clock Optical Application SPA, DPA, CPA on embedded processors and smart cards SEMA, DEMA and EMA-RF on smart cards, contactless cards and embedded processors RFA on contactless smart cards Power glitching on embedded processors and smart cards Clock glitching on smart cards Optical fault injection on embedded processors and smart cards Strengths Low noise smart card measurements, short acquisition times, advanced filtering and alignment options Sensitivity and resolution optimised for crypto processors, automated surface scanning, flexible in use Low noise contactless measurements, integrated triggering and highly configurable device control Very short pulse generation, flexible glitch program, structured and efficient test approach Very short pulse generation, flexible glitch program, structured and efficient test approach Multi-glitching, precise power control, customised optics, diode lasers for front and back side testing Standalone options Power Tracer SDK EM Probe Station SDK CleanWave VC Glitcher SDK VC Glitcher SDK DLS SDK VC Glitcher SDK Embedded Processor Measurement / Pertubation Control Triggering Current Probe with amplifier Native interface, program on target or RS-232/TCP-IP from software icwaves, external, program on target or software EM Probe Station Native interface, program on target or RS-232/TCP-IP from software icwaves, external, program on target or software - VC Glitcher with Glitch Amplifier - Native interface, program on target or RS-232/TCP-IP from software - icwaves, external, program on target or software - VC Glitcher with Diode Laser Station - Native interface, program on target or RS-232/TCP-IP from software (optional: Multi-Area upgrade) - icwaves, external, program on target or software Measurement / Pertubation Power Tracer EM Probe Station - VC Glitcher VC Glitcher Diode Laser Station Smart Card Contactless Smart Card Control Integrated Power Tracer - Integrated Integrated VC Glitcher (optional: Multi-Area upgrade) Triggering Measurement / Pertubation Power Tracer or icwaves Power Tracer or icwaves - CleanWave with EM Probe Station Control - MP300 TCL2 MP300 TCL2 Triggering - icwaves or MP300 TCL2 - VC Glitcher or icwaves C leanwave with - - MP300 TCL2 icwaves or MP300 TCL2 VC Glitcher or icwaves VC Glitcher or icwaves Diode Laser Station - - MP300 TCL2 (optional: Multi-Area upgrade) - - icwaves or MP300 TCL2 Separate Components icwaves CleanWave EM Probe HS/LS Application Real-time trigger generation from filtered power or EM signal Removes RF carrier wave for high quality RFA/ EMA-RF measurements Standalone probes to measure EM emanations with high and low sensitivity respectively Strengths Real-time trigger pulse generation, tunable digital filter for noisy signals, integrates witch each inspector component Filters RF signals and demodulates data, optimizes signal-to-noise ratio, greatly reduces the number of traces required Sensitivity and resolution optimized for different crypto processors with weak or strong emissions Standalone SDK Yes Yes 14
15 Challenge your security Riscure BV Frontier Building Delftechpark XJ Delft The Netherlands Phone: +31 (0) Fax: +31 (0) Chamber of Commerce reg. no
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Secure application programming in the presence of side channel attacks. Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203
Secure application programming in the presence of side channel attacks Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203 Attacks in the field Survey 2007*, Hong Kong: Asia-Pacific Pay-TV
Security testing of hardware product
Alain MERLE CESTI LETI CEA Grenoble [email protected] Security testing of hardware product DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security testing, Attacks, Evaluations,
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Smart Card Security How Can We Be So Sure?
Smart Card Security How Can We Be So Sure? Ernst Bovelander TNO Centre for Evaluation of Instrumentation and Security Techniques PO Box 5013 2600 GA Delft, The Netherlands [email protected] 1. Introduction
How To Perform Differential Frequency Analysis (Dfa) On A Powerline (Aes) On An Iphone Or Ipad (Ase) On Microsoft Powerline 2 (Aces) On Pc Or Ipa (Aas)
A New Frequency-Based Side Channel Attack for Embedded Systems by Chin Chi Tiu A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied
On Security Evaluation Testing
On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation
Security testing for hardware product : the security evaluations practice
Alain MERLE CESTI LETI CEA Grenoble [email protected] Security testing for hardware product : the security evaluations practice DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security
Side Channels: Hardware or Software threat?
Side Channels: Hardware or Software threat? Job de Haas Riscure Who am I Job de Haas Principal Security Analyst at Riscure Testing security on: Set-top-boxes, mobile phones, smart cards, payment terminals,
Joint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
Microsemi Security Center of Excellence
Microsemi Security Center of Excellence Sales and FAE Training August 24, 2015 1 Outline What is the Security Center of Excellence (SCoE)? Overview of Microsemi s Security capabilities and expertise Threat
Hardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards. March 2009. Version 2.7 Revision 1 CCDB-2009-03-001
Supporting Document Mandatory Technical Document Application of Attack Potential to Smartcards March 2009 Version 2.7 Revision 1 CCDB-2009-03-001 Foreword This is a supporting document, intended to complement
Horst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.
A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks HoonJae Lee 1, ManKi Ahn 2, SeonGan Lim 3, and SangJae Moon 4 1 Dongseo University, Busan, 617-716, Korea [email protected]
Smartcard IC Platform Protection Profile
Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt
Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager
Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager About our Cryptographic and Security Testing Laboratory Bringing together a suite of conformance testing
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Loop Bandwidth and Clock Data Recovery (CDR) in Oscilloscope Measurements. Application Note 1304-6
Loop Bandwidth and Clock Data Recovery (CDR) in Oscilloscope Measurements Application Note 1304-6 Abstract Time domain measurements are only as accurate as the trigger signal used to acquire them. Often
Maximizing Receiver Dynamic Range for Spectrum Monitoring
Home Maximizing Receiver Dynamic Range for Spectrum Monitoring Brian Avenell, National Instruments Corp., Austin, TX October 15, 2012 As consumers continue to demand more data wirelessly through mobile
R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission
Secure Communications Product Brochure 01.01 R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission R&S MKS9680 Modular Encryption Device At a glance The R&S MKS9680 is a highly
Software Development Kit
Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice
GETTING STARTED WITH LABVIEW POINT-BY-POINT VIS
USER GUIDE GETTING STARTED WITH LABVIEW POINT-BY-POINT VIS Contents Using the LabVIEW Point-By-Point VI Libraries... 2 Initializing Point-By-Point VIs... 3 Frequently Asked Questions... 5 What Are the
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
APPLICATION NOTE GaGe CompuScope 14200-based Lightning Monitoring System
APPLICATION NOTE GaGe CompuScope 14200-based Lightning Monitoring System Challenge A customer needed to upgrade an older data acquisition unit for a real-time lightning monitoring system. Unlike many lightning
VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
LLRF. Digital RF Stabilization System
LLRF Digital RF Stabilization System Many instruments. Many people. Working together. Stability means knowing your machine has innovative solutions. For users, stability means a machine achieving its full
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Advances in Smartcard Security
Advances in Smartcard Security Marc Witteman Introduction Over the last decade smartcards have entered our global community. Although initially they were only used as simple phone cards they now support
U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer www.ipswitchft.com FIPS 140-2 is a standard first published in 2001 by the U.S. National
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Network Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
Software Modularisation and the Common Criteria
Software Modularisation and the Common Criteria A Smartcard Developer s Perspective Dr. Karsten Klohs Morpho, Riemekestraße 160, 33106 PADERBORN [email protected] Abstract. The Common Criteria (CC)
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
MATRIX borehole logging system
MATRIX borehole logging system Combining their long experience in the slimhole logging industry Mount Sopris and ALT have teamed up to develop M A T R I X, providing a single solution to the multiplication
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
COMPLIANCE 3 SOFTWARE SUITE
COMPLIANCE 3 SOFTWARE SUITE The definitive software environment for RF EMC testing Modular, integrated, flexible test environment From entry level to full test lab management Secure, reliable, configurable
RF Network Analyzer Basics
RF Network Analyzer Basics A tutorial, information and overview about the basics of the RF Network Analyzer. What is a Network Analyzer and how to use them, to include the Scalar Network Analyzer (SNA),
Security IC Platform Protection Profile
Security IC Platform Protection Profile Version 1.0 15.06.2007 developed by Atmel Infineon Technologies AG NXP Semiconductors Renesas Technology Europe Ltd. STMicroelectronics Registered and Certified
Technologies for PRS Receivers
Seventh Framework Programme of the European Community for Research, Technological Development and Demonstration Activities (2007 to 2013) 'Cooperation' Specific Programme Theme: Transport (including Aeronautics)
Threat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Realtime FFT processing in Rohde & Schwarz receivers
Realtime FFT in Rohde & Schwarz receivers Radiomonitoring & Radiolocation Application Brochure 01.00 Realtime FFT in Rohde & Schwarz receivers Introduction This application brochure describes the sophisticated
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Secure Hardware PV018 Masaryk University Faculty of Informatics
Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators
SIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services
Market Data + Services Advanced outsourcing solutions IT Hosting and Managed Services Table of Contents 3 Table of Contents Introduction Market Data + Services powers the financial community with a range
VASCO Consulting Services
VASCO Consulting Services OVERVIEW OF ALL VASCO CONSULTING SERVICES 1. VASCO Consulting Services BEFORE your implementation S trong authentication for e-banking: overview and best practices Two-factor
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
EBERSPÄCHER ELECTRONICS automotive bus systems. solutions for network analysis
EBERSPÄCHER ELECTRONICS automotive bus systems solutions for network analysis DRIVING THE MOBILITY OF TOMORROW 2 AUTOmotive bus systems System Overview Analyzing Networks in all Development Phases Control
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
MsC in Advanced Electronics Systems Engineering
MsC in Advanced Electronics Systems Engineering 1 2 General overview Location: Dijon, University of Burgundy, France Tuition Fees : 475 / year Course Language: English Course duration: 1 year Level: Second
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Spectrum Analyzers vs. Monitoring Receivers. Paul Denisowski, Application Engineer Rohde & Schwarz
Spectrum Analyzers vs. Monitoring Receivers Paul Denisowski, Application Engineer Rohde & Schwarz Spectrum Management Requirements What signals are present at which frequencies? Additional responsibilities
CryptoFirewall Technology Introduction
CryptoFirewall Technology Introduction Cryptography Research, Inc. www.cryptography.com 575 Market St., 21 st Floor, San Francisco, CA 94105 1998-2007 Cryptography Research, Inc. Protected under issued
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)
Page 1 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) ECC RECOMMENDATION (06)01 Bandwidth measurements using FFT techniques
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
APPLICATION CASE OF THE END-TO-END RELAY TESTING USING GPS-SYNCHRONIZED SECONDARY INJECTION IN COMMUNICATION BASED PROTECTION SCHEMES
APPLICATION CASE OF THE END-TO-END RELAY TESTING USING GPS-SYNCHRONIZED SECONDARY INJECTION IN COMMUNICATION BASED PROTECTION SCHEMES J. Ariza G. Ibarra Megger, USA CFE, Mexico Abstract This paper reviews
Wi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
The Real Challenges of Configuration Management
The Real Challenges of Configuration Management McCabe & Associates Table of Contents The Real Challenges of CM 3 Introduction 3 Parallel Development 3 Maintaining Multiple Releases 3 Rapid Development
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
Engineering Sciences 151. Electromagnetic Communication Laboratory Assignment 3 Fall Term 1998-99
Engineering Sciences 151 Electromagnetic Communication Laboratory Assignment 3 Fall Term 1998-99 WAVE PROPAGATION II: HIGH FREQUENCY SLOTTED LINE AND REFLECTOMETER MEASUREMENTS OBJECTIVES: To build greater
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
W a d i a D i g i t a l
Wadia Decoding Computer Overview A Definition What is a Decoding Computer? The Wadia Decoding Computer is a small form factor digital-to-analog converter with digital pre-amplifier capabilities. It is
Logging of RF Power Measurements
Logging of RF Power Measurements By Orwill Hawkins Logging of measurement data is critical for effective trend, drift and Exploring the use of RF event analysis of various processes. For RF power measurements,
Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag
Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Thomas Korak Thomas Plos Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology,
Evaluation of Digital Signature Process
Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: [email protected] Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;
Whitepaper Document Solutions
Whitepaper Document Solutions ScannerVision 3 Contents Contents... 2 Introduction... 3 ScannerVision introduction... 4 Concept... 4 Components... 4 Deploying ScannerVision... 5 Supported Operating Systems...
