Secure Internet of Things Project
|
|
- Angelica Gibson
- 7 years ago
- Views:
Transcription
1 Secure Internet of Things Project Philip Levis, Stanford Computer Forum Internet of Things Workshop April 14, 2016 Stanford University 1
2 The Internet of Things (IoT) 2
3 A Security Disaster HP conducted a security analysis of IoT devices 1 80% had privacy concerns 80% had poor passwords 70% lacked encryption 60% had vulnerabilities in UI 60% had insecure updates 1 3
4 Securing the Internet of Things Secure Internet of Things Project 5 year project (just started second year) 12 faculty collaborators 3 universities: Stanford, Berkeley, and Michigan Rethink IoT systems, software, and applications from the ground up Make a secure IoT application as easy as a modern web application 4
5 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles A brief overview of talks today 5
6 The EmNets Vision Information technology (IT) is on the verge of another revolution The use of EmNets [embedded networks] throughout society could well dwarf previous milestones. 1 The motes [EmNet nodes] preview a future pervaded by networks of wireless batterypowered sensors that monitor our environment, our machines, and even us. 2 1 National Research Council. Embedded, Everywhere, MIT Technology Review. 10 Technologies That Will Change the World, iii.2005 Stanford Interview Talk 2 6
7 Two Game-Changers ARM Cortex M series First released 2004 Ultra-low power 32-bit processor 8-96kB of RAM, kB code flash Sleep currents recently dropped <1µA Bluetooth Low Energy First released in 2006 Send a 30 byte packet once per second, last for a year on a coin cell battery Support was weak until Apple incorporated into ibeacon, now all major smartphones include it 7
8 Example Part: nrf51822 Cortex M0+ with integrated 2.4GHz transceiver Supports Bluetooth Low Energy Two models: 32kB/256kB or 16kB/128kB DigiKey cost for 25,000: $1.99 8
9 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles A brief overview of talks today 9
10 IoT Security is Hard Complex, distributed systems differences in resources across tiers Many languages, OSes, and networks Specialized hardware embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi Just developing applications is hard Securing them is even harder 3G/4G, TCP/IP Enormous attack surface Reasoning across hardware, software, languages, devices, etc. What are the threats and attack models? Secure Internet of Things Valuable data: personal, location, presence Rush to development + hard avoid, deal later Ruby/Rails, Python/Django, J2EE, PHP, Node.js Obj-C/C++, Java, Swift, Javascript/HTML 23 10
11 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles A brief overview of talks today 11
12 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 12
13 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 13
14 14
15 1995: SSL
16 Flexible Crypto Hardware Devices need to be able to support ciphers that are used 20 years from now Add extensible cryptographic accelerator: silicon is cheap and BLE dominates the SoC Designing a 20-year crypto processor Symmetric crypto: S-boxes and vectors, an instruction set Public key crypto: several very different constructions What if quantum computers are real in 20 years? There is often unused micro controller die area 16
17 11:20-11:40, Kevin Kiningham CESEL Symmetric ciphers Vector arithmetic ECC public-key operations MCU Core (Cortex M) S-Boxes Polynomial mult. Post-quantum public key ECC co-processor RNG, atomic counter RNG/CTR Memory bus R-LWE Processor SHA-2, SHA-3 Fast hash function 17
18 11:40-12:00, Ben Lampert Random Numbers Symmetric ciphers Vector arithmetic ECC public-key operations MCU Core (Cortex M) S-Boxes Polynomial mult. Post-quantum public key ECC co-processor RNG, atomic counter RNG/CTR Memory bus R-LWE Processor SHA-2, SHA-3 Fast hash function 18
19 11:00-11:20, Amit Levy Tock: A Secure, Embedded OS Written in Rust, a type-safe systems language Microkernel design Kernel has small trusted base of unsafe code Applications can load safe kernel modules for drivers Applications can be written in any language System call interface requires applications allocate memory for kernel calls Kernel can grant direct register access (CortexM MPU operates at 32 byte granularity) Systems challenges Concurrency models Event-driven memory safety high address App specific Kernel memory low address Memory Mapped I/O Kernel Stack Second App Memory First App Memory Code TRNG App code 19
20 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 20
21 Model Today Transport-layer security (TLS) between devices and cloud services Internet applications: we control one end point Can install new certificates, observe data IoT applications: we are a transit network Can t see or control what happens on either end 21
22 Intrusion Detection How do we build an intrusion detection system for our smart home? Can t see what data our devices are transmitting They could be compromised and we ll never know Enterprises solve this by installing new certificates on endpoints, allow IDS to look inside TLS, filter trojan horses from , etc. We don t control these devices, can t install new certificates 22
23 10:00-10:20, Judson Wilson Keith Winstein TLS - Rotate and Release auditor Transport Layer Security - Rotate and Release A trusted auditor can decrypt all traffic but not forge traffic (hard part!) Four operating modes that together are compatible with all versions of TLS 23
24 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 24
25 2:30-2:50, Holly Chiang 2:50-3:10, Joanne Lo 3:10-3:30, Meghan Clark Applications! Applications drive and inform all this research Water conservation in a Stanford dorm Holly Chiang, 2:30-2:50 Wearable, smart technology in everyday objects Joanne Lo, 2:50-3:10 Personal telepresence in the home Meghan Clark, 3:10-3:30 25
26 1:55-2:15, Laurynas Riliskis Ravel Framework Write a distributed model view controller pipeline Models, views, controllers. transforms. and spaces 26
27 1:15-1:35, Rohit Ramesh 1:35-1:55, Luke Hsiao Device Generation Applications involve software and hardware Embedded devices are application specific Hardware/software boundary is difficult Refining a design is easier than writing from scratch Idea: generate a prototype device from software specification, allow a programmer to tweak Two problems How does one compile the embedded device? Compiler must have a library of components to use: where does it come from? 27
28 10:20-10:40, Chang Lan Securing Middleboxes All networks today depend on middleboxes Firewalls, optimizers, NATs, intrusion detection The IoT will be no different Outsourcing this functionality into the cloud has many advantages Simplicity, management, aggregation: network as a service Is it possible to securely outsource this functionality (perform it on encrypted data)? 28
29 Day s Schedule 8:30am - 9:30am 9:30am - 9:40am 9:40am - 10:00am 10:00am - 10:20am 10:20am - 10:40am 10:40am - 11:00am 11:00am - 11:20am 11:20am - 11:40am 11:40am - Noon Noon - 1:15pm 1:15pm - 1:35pm 1:35pm - 1:55pm 1:55pm - 2:15pm welcome and check-in Introductions:The IoT Revolution and Our Research in IoT Secure Internet of Things Project Auditing IoT Communications with TLS-RaR Embark: Securely Outsourcing Middleboxes to the Cloud break Tock, a Secure Embedded Operating System Hardware Support for Long-Term Cryptographic Flexibility A Fast, Cheap, High-Entropy Source for IoT Devices lunch Embedded Device Generation: Turning Software into Hardware Automatically Building a Component Library from Datasheets Programming IoT Applications with Ravel 2:15pm - 2:30pm break 2:30pm - 2:50pm An Energy-Harvesting and Reliable Water Flow Sensor 2:50pm - 3:10pm Incognito Wearables: Seamlessly Incorporating Fashion and Function 3:10pm ; 3:30pm The Haunted House: Virtual Shared Living over a Home-to-Home 3:30pm - 3:45pm Network, break 3:45pm - 4:15pm Innovation in a Post Moore's Law World: Another View of IoT 4:15pm - 6:00pm reception overview networks systems programs applications looking forward 29
30 Why Now? Technology has just reached the tipping point BLE, ibeacon Cortex M series Sensors Harvesting circuits We've been waiting Leaders in prototyping, cryptographic computation, IoT networking, secure systems, analytics, and hardware design What are the threats? Application attackers? But it's still early enough Most big applications haven't been thought of yet Let's not repeat the web (as good as it is for publications) 30
31 Thank you! State Farm SystemX Alliance 31
Secure Internet of Things Project (SITP)
Secure Internet of Things Project (SITP) Philip Levis Stanford University Project Workshop Stanford University August 11, 2014 1 The Internet of Things (IoT) 2 A Security Disaster HP conducted a security
More informationZigBee Technology Overview
ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification
More informationMicrocontrollers Deserve Protection Too
Microcontrollers Deserve Protection Too Amit Levy with: Michael Andersen, Tom Bauer, Sergio Benitez, Bradford Campbell, David Culler, Prabal Dutta, Philip Levis, Pat Pannuto, Laurynas Riliskis Microcontrollers
More informationNanopowerCommunications: Enabling the Internet of Things OBJECTS TALK
NanopowerCommunications: Enabling the Internet of Things OBJECTS TALK When objects can both sense the environment and communicate, they become tools for understanding complexity and responding to it swiftly.
More informationIoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationLast Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
More informationTriathlon of Lightweight Block Ciphers for the Internet of Things
NIST Lightweight Cryptography Workshop 2015 Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Leo Perrin, Johann Großschädl, Alex Biryukov
More informationThe new 32-bit MSP432 MCU platform from Texas
Technology Trend MSP432 TM microcontrollers: Bringing high performance to low-power applications The new 32-bit MSP432 MCU platform from Texas Instruments leverages its more than 20 years of lowpower leadership
More informationARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM
ARM Processors and the Internet of Things Joseph Yiu Senior Embedded Technology Specialist, ARM 1 Internet of Things is a very Diverse Market Human interface Location aware MEMS sensors Smart homes Security,
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More informationSecurity Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
More informationProtecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing
Protecting Corporate Data from Mobile Threats And the emerging role for microsd-based security Art Swift CEO, CUPP Computing 1 Information security is broken $77B WORLDWIDE SPENDING ON INFORMATION SECURITY
More informationAnalyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
More informationH MICRO CASE STUDY. Device API + IPC mechanism. Electrical and Functional characterization of HMicro s ECG patch
H MICRO CASE STUDY HMicro HMicro is a wireless healthcare chip company to enable industry s first fully disposable wireless patches with high reliability, high data integrity, low cost, small form factor
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More informationOMAP platform security features
SWPT008 - July 2003 White Paper OMAP platform security features By Harini Sundaresan Applications Engineer, OMAP Security Texas Instruments, Wireless Terminal Business Unit This white paper introduces
More informationAppPulse Mobile. Whitepaper: Overhead, Privacy, and Security. March 2016
AppPulse Mobile Whitepaper: Overhead, Privacy, and Security March 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty
More informationBluetooth 4.0 Solutions for Apple ios Devices. Bluegiga Technologies
Bluetooth 4.0 Solutions for Apple ios Devices Bluegiga Technologies Agenda Introduction How to build Bluetooth 4.0 applications Compatible Bluegiga products What is Bluetooth low energy? Summary Introduction
More informationSecure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
More informationWireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth
More informationSophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
More information2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics
ARTIK TM The Ultimate Platform Solution for IoT 2015. 9. 17 MyungKoo Kang (VP) Samsung Electronics Future Changes from IoT Privacy in the Web Security in SmartGrill 2 IoT Market Forecast ($T) 7 6 5 4 3
More informationReminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
More informationA Survey on ARM Cortex A Processors. Wei Wang Tanima Dey
A Survey on ARM Cortex A Processors Wei Wang Tanima Dey 1 Overview of ARM Processors Focusing on Cortex A9 & Cortex A15 ARM ships no processors but only IP cores For SoC integration Targeting markets:
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationMobile and Embedded/IoT market Overview and Trends. June 2014
Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum
More informationAppliedMicro Trusted Management Module
AppliedMicro Trusted Management Module Majid Bemanian, Sr. Director of Marketing, Applied Micro Processor Business Unit July 12, 2011 Celebrating 20 th Anniversary of Power Architecture 1 AppliedMicro
More informationCycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationBerlin Institute of Technology FG Security in Telecommunications
Berlin Institute of Technology FG Security in Telecommunications Weiss L4Android: A Generic Operating System Framework for Secure Smartphones Workshop on Security and Privacy in Smartphones and Mobile
More informationThingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationSNAPPIN.IO. FWR is a Hardware & Software Factory, which designs and develops digital platforms.
SNAPPIN.IO SNAPPIN.IO Snappin is an ecosystem oriented to retail that aims to increase in store sales due to the proactive involvement of users, relying on mechanisms of "Engagement", "Empowerment " and
More informationApplied Micro development platform. ZT Systems (ST based) HP Redstone platform. Mitac Dell Copper platform. ARM in Servers
ZT Systems (ST based) Applied Micro development platform HP Redstone platform Mitac Dell Copper platform ARM in Servers 1 Server Ecosystem Momentum 2009: Internal ARM trials hosting part of website on
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationSecure Cloud Storage and Computing Using Reconfigurable Hardware
Secure Cloud Storage and Computing Using Reconfigurable Hardware Victor Costan, Brandon Cho, Srini Devadas Motivation Computing is more cost-efficient in public clouds but what about security? Cloud Applications
More informationM-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
More informationQuestions from The New SensorTag - IoT Made Easy Webinar
Questions from The New SensorTag - IoT Made Easy Webinar Are there any plans to make a Windows API available (preferably portable for use in Windows 10 Universal applications) It is in our queue of projects,
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationGecko. Energy-friendly microcontrollers for the IoT. Gecko MCUs Complete portfolio of energyfriendly 32-bit microcontrollers PRODUCT SELECTOR GUIDE
Gecko MCUs Energy-friendly microcontrollers for the IoT PRODUCT SELECTOR GUIDE Gecko MCUs Complete portfolio of energyfriendly 32-bit microcontrollers www.silabs.com/efm32 Smart. Connected. Energy-Friendly.
More informationAyla Networks, Inc. SOC 3 SysTrust 2015
Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationAccellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
More informationReducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
More informationCenter of Academic Excellence Cyber Operations Program 2013 Application
Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department
More informationHow to secure the Internet of Things?
How to secure the Internet of Things? Hannes Tschofenig hannes.tschofenig@arm.com 19 th May 2015 1 Agenda IoT is about optimizing for constrained environments. IoT is not a precise/well-defined concept.
More informationVirtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
More informationERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationGerard Fianen. Copyright 2014 Cypherbridge Systems LLC info@cypherbridge.com. Page 1
Securing the Internet of Things Gerard Fianen Copyright 2014 Cypherbridge Systems LLC info@cypherbridge.com Page 1 INDES-IDS BV - Embedded Software Development The choice of professionals info@indes.com
More informationMobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
More informationKey & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
More informationBasic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
More informationAdding WiFi to Your Embedded System. WPG Americas & Gainspan Titus Wandinger (WPG) & Su Li (Gainspan) April 23, 2013
Adding WiFi to Your Embedded System WPG Americas & Gainspan Titus Wandinger (WPG) & Su Li (Gainspan) April 23, 2013 Your partners for Embedded Wi-Fi Multi Market Leader 32 bit ARM MCU Leader Ultra low
More informationInternet of Things: TI's Wireless Connectivity Solutions
Internet of Things: TI's Wireless Connectivity Solutions Market Size (units) Why the IoT is attractive 10B + The IoT is an enabling technology that will serve thousands of end products IoT 1B Cell phone
More informationINSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015
INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 CHERYL HARRIS, PH.D. DECISIVE ANALYTICS LLC 575 MADISON AVENUE, 10 TH FL NEW YORK, NY 10022 917.628.6167 14. January 2015
More informationWhat marketing won t tell you about the Internet of Things
What marketing won t tell you about the Internet of Things Elecia White #eelive Produced by EE Times Why are you here? Why am I here? Founder of Logical Elegance, embedded systems consulting firm Author
More informationWIND RIVER INTELLIGENT DEVICE PLATFORM XT
WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but
More informationHome Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
More informationSecurity Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for BlackBerry Version 12.0 Published: 2014-11-12 SWD-20141106140037727 Contents Introduction... 7 About this guide...8 What is BES12?...9 Key features of
More informationUsing AES 256 bit Encryption
Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State
More informationSmartphone Quick-Jack Solution FASTER TO PRODUCT FASTER TO MARKET
Smartphone Quick-Jack Solution FASTER TO PRODUCT FASTER TO MARKET Are You Are You A Smartphone App Developer looking for an easy a way to Or An End-Product Designer looking for a simple way to Incorporate
More informationFig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
More informationIntroducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
More informationThe Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow
Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since
More informationRIOT CONTROL The Art of Managing Risk for Internet of Things
RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the
More informationQuantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
More informationICNC 2015 Panel. Internet of Things: Technical Challenges and Business Opportunities. 18 th Feb., 2015
ICNC 2015 Panel Internet of Things: Technical Challenges and Business Opportunities 18 th Feb., 2015 Dr. Nikhil Balram President & CEO, Ricoh Innovations Corporation, Menlo Park, CA Visiting prof. of vision
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
More informationHP AppPulse Mobile. Whitepaper: Privacy, Security, and Overhead. Document Release Date: September 2014 (v1.0)
HP AppPulse Mobile Whitepaper: Privacy, Security, and Overhead Document Release Date: September 2014 (v1.0) Introduction Introduction In mobile applications, user experience isn t everything; it s the
More informationCourse Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
More informationI vantaggi dell?utilizzo di JAVA nella strategia M2M
1 I vantaggi dell?utilizzo di JAVA nella strategia M2M Giampaolo SANTARSIERO Oracle ISV/OEM Presales Italy 2 Internet of Things: The Next Horizon Needs a Device to Data Centre platform 3 Device to Data
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationGoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
More informationNetwork Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationM2M For industrial and automotive
M2M For industrial and automotive Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is
More informationFRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationREAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
More informationA Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
More informationSymantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
More informationIoT Security. Introduction. Threat Model
IoT Security Introduction In this 1248 white paper we summarise the various aspects of security which need to be considered when designing connected products for the Internet of Things. We give a general
More informationADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM 1 The ARM architecture processors popular in Mobile phone systems 2 ARM Features ARM has 32-bit architecture but supports 16 bit
More informationCut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
More informationIndex. 1-FLYPOS hardware/firmware Technology Overview 2-FLYPOS software architecture 3-Gateway/Acquirer Interface 4-Letters of Approval
FLYPOS Index 1-FLYPOS hardware/firmware Technology Overview 2-FLYPOS software architecture 3-Gateway/Acuirer Interface 4-Letters of Approval 2 1- FLYPOS hardware/firmware Technology Overview 3 FLYPOS Technology
More informationIOT the Last Miles. Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl
IOT the Last Miles Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl Embedded IoT Solution Embedded IoT Software Remote Management Security OS Intelligent Systems RISC,
More informationARM mbed IoT Device Platform. November 3 rd, 2014
ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the
More informationNetwork Security 101 Multiple Tactics for Multi-layered Security
Security and Resilience for Utility Network Communications White Paper Communications networks represent a partial paradox. The very openness and ubiquity that make them powerful can also present a weakness.
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationSmart Systems: the key enabling technology for future IoT
Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London
More informationSTM32L. Ultra-low-power Cortex -M3 devices
STM32L Ultra-low-power Cortex -M3 devices STM32L press release STM32L 32- to 128-Kbyte products are entering full production 2 nd half March 2011 Part of industry s largest ARM Cortex -M 32-bit microcontroller
More informationAccelerating I/O- Intensive Applications in IT Infrastructure with Innodisk FlexiArray Flash Appliance. Alex Ho, Product Manager Innodisk Corporation
Accelerating I/O- Intensive Applications in IT Infrastructure with Innodisk FlexiArray Flash Appliance Alex Ho, Product Manager Innodisk Corporation Outline Innodisk Introduction Industry Trend & Challenge
More informationSOSSE. Matthias Brüstle <m@mbsks.franken.de> Simple Operating System for Smartcard Education. Kommunikationsnetz Franken e.v.
Matthias Brüstle Smart Cards mit SOSSE sind lecker 1 SOSSE Simple Operating System for Smartcard Education Matthias Brüstle Kommunikationsnetz Franken e.v. Matthias Brüstle Smart Cards
More informationDEVELOPING SECURE SOFTWARE
DEVELOPING SECURE SOFTWARE A FOUNDATION FOR CLOUD AND IOT SECURITY Eric Baize @ericbaize Senior Director, Product Security Office EMC Corporation Chairman of SAFECode CSA EMEA Congress November 2015 1
More informationMobile Operating Systems Lesson 05 Windows CE Part 1
Mobile Operating Systems Lesson 05 Windows CE Part 1 Oxford University Press 2007. All rights reserved. 1 Windows CE A 32 bit OS from Microsoft Customized for each specific hardware and processor in order
More information