Secure Software Delivery and Installation in Embedded Systems
|
|
|
- Sheila Black
- 10 years ago
- Views:
Transcription
1 Secure Software Delivery and Installation in Embedded Systems André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi Horst-Görtz-Institute, Bochum, Germany ISPEC 2005 Presentation Singapore, April 13, 2005
2 HW* and SW* will become separate products within an embedded system, thus providing an additional revenue source to SW providers CHANGES IN THE ROLE OF SW IN AN EMBEDDED SYSTEM Current situation HW* and SW* as one product from same supplier SW updates mainly necessary for warrantybased replacement of defective SW No revenues for SW provider due to warranty obligations Expected future situation HW and SW as separate products, potentially from different suppliers In addition, SW updates attractive due to new and/or enhanced functionality Additional revenue source for SW provider due to valueadded and customers' willingness to pay * HW: hardware, SW: software 1
3 There are four major difficulties when a provider installs a SW update in a vehicle DIFFICULTIES WITH SW UPDATES IN A VEHICLE Service provider needs specific equipment, e.g., diagnostic tester, and skills Service providers have different skill sets Compatibility among SW components is not self-evident due to number of ECUs High economic value of vehicle and failure consequences induce tough requirements 2
4 The system model contains five different roles which correspond with current players in the automotive industry ROLES IN THE SYSTEM MODEL AND THEIR COUNTERPARTS IN THE AUTOMOTIVE INDUSTRY OEM* Develops and assembles the user platform in cooperation with his suppliers Automotive counterpart: car manufacturers such as Daimler Chrysler, GM, Toyota, etc. Installation Service Provider (ISP) Maintains the user platform via HW repair/replacement and SW installation with specific equipment Automotive counterpart: car dealers, garages, road service teams, etc. SW User platform (UP) Is an embedded system which consists of several components whose SW can be updated Automotive counterpart: car Installation services SW Licenses Software Application Programmer (SAP) Develops and distributes SW components for the user platform in the form of updates and/or upgrades Automotive counterpart: suppliers such as Bosch, Delphi, Denso, Siemens, Visteon, etc. Additional role: Trusted Third Party (TTP) License Provider (LP) Generates licenses for SW from OEM and SAPs, distributes them to user platforms via ISPs Automotive counterpart: not existing or assumed by OEMs and SAPs * Overall Equipment Manufacturer 3
5 There are many scenarios which lead to damage to an innocent party, four of which we detail FOUR EXEMPLARY SCENARIOS LEADING TO DAMAGE TO INNOCENT PARTIES EXAMPLES 1 SW is not authentic 2 ISP* is not qualified An honest garage installs a supposedly correct SW component for the ABS The adversary has replaced the SW component with a defective one The car fails, leading to an accident An unqualified garage installs SW for the airbags Due to wrong parameterization, the airbags do not trigger off properly The victim sues the OEM* 3 Innocent ISP is accused 4 SAP* is discriminated A SW component has a known error which might lead to a short circuit and set fire A malicious car owner burns his car and accuses his innocent garage of having installed the SW component An honest SAP develops a SW component The OEM has a SW component with identical functionality, but higher price The OEM configures each car such that only his SW can be installed * ISP: Installation Service Provider, OEM: Overall Equipment Manufacturer, SAP: Software Application Programmer 4
6 Each role in the system model has specific requirements regarding any software installation REQUIREMENTS OF ALL ROLES IN THE SYSTEM MODEL OEM Correctness Rights enforcement Compatibility enforcement ISP clearance enforcement Confidentiality Integrity Installation Service Provider (ISP) Correctness Non-repudiation Clearance enforcement Non-discrimination Frame-proofness User Correctness Non-repudiation Unique installation origin Authenticity Software Application Programmer (SAP) All OEM requirements Non-discrimination License Provider (LP) Non-repudiation 5
7 Three basic protocols are a prerequisite of any SW installation SYSTEM SETUP THREE BASIC PROTOCOLS PRECEDING ANY SW INSTALLATION 1 Assignment of clearance levels to ISPs ISP* TTP* ClearReq() 2 Certification of SW components OEM/SAP* SWSub() s enc =Enc PKBE (s), σ comm =PropComm() req clear ξ clear req sw ξ sw, σ integer ClearIss() TTP SWIss() Distribution of SW over broadcast channel OEM/SAP (s enc, ξ sw, σ comm, R lic ) ISPs X Message flow Party X participates in protocol SW installation protocol can start 3 Distribution of SW licenses ISP LicReq() req lic γ lic LP* LicIss() Based on asymmetric cryptography * ISP: Installation Service Provider, TTP: Trusted Third Party, SAP: Software Application Programmer, LP: License Provider 6
8 In the SD scheme, each receiver obtains the keys just off his key path within each subtree BROADCAST ENCRYPTION: KEYS OF AN EXEMPLARY USER IN THE SUBSET DIFFERENCE SCHEME Exemplary user U 5 Key, stored by U 5 Tree of level 0 (root) Subtrees of level i i = 0 i = 1 i = 2 i = 3 Example with n = 16 users and tree height log 2 n = 4 U 5 U 5 U 5 U 5 No. of stored keys Σ 10 Source: The LSD Broadcast Encryption Scheme, CRYPTO 2002, LNCS 2442, pp
9 Compared to SD*, the basic LSD** scheme significantly reduces the storage requirements of the users by slightly increasing the message header length COMPARISON OF SD* AND BASIC LSD** PERFORMANCE PARAMETERS Main difference n Number of users SD r Number of revoked users User storage : O(log 2 n) Example : 406 keys for 2 28 users Message header : O(r) User computation : O(log n) Basic LSD User storage Example Message header : O(log 3/2 n) : 146 keys for 2 28 users : O(2 r) = O(r) User computation : O(log n) * Subset difference ** Layered subset difference, not lysergic acid diethylamide Source: The LSD Broadcast Encryption Scheme, CRYPTO 2002, LNCS 2442, pp
10 A SW installation consists of four basic steps FOUR STEPS OF A SW INSTALLATION UP* ISP* 1 SW request: SWReq(k,m,r n ) σ req 2 SW delivery: SWDel(s enc, γ lic )** 3 Installation ExtInstConf(γ lic, ind) confirmation: σ inst σ conf SW installation succeeded 4 Acknowledgment of confirmation: σ ack ConfAck (σ conf ) Based on asymmetric cryptography * UP: User Platform, ISP: Installation Service Provider ** In order to execute SWDel(), the ISP must have executed LicReq() and received γ lic 9
11 In each step of a SW installation, the party in charge verifies several necessary conditions NECESSARY CONDITIONS FOR EACH SW INSTALLATION STEP (1/2) 1 Conditions for a user platform to issue a SW request User platform and SW are compatible ISP* has sufficient clearance level All certificates match SW certificate ξ SW is authentic, i.e., generated by the TTP* Property commitment σ comm is authentic, i.e., generated by the SW provider Clearance level certificate is authentic, i.e., generated by the TTP Main criteria Compatibility, clearance enforcement, and authenticity 2 Conditions for an ISP to deliver a SW installation package SW request is authentic, i.e., generated by the user platform The set of requested rights is a subset of the allowed usage rights of the SW, i.e., does not violate the terms and conditions License provider issues a valid license ISP possesses the requested SW User platform has a valid ID Authenticity, rights enforcement, and soundness * ISP: Installation Service Provider, TTP: Trusted Third Party 10
12 In each step of a SW installation, the party in charge verifies several necessary conditions NECESSARY CONDITIONS FOR EACH SW INSTALLATION STEP (2/2) 3 Conditions for a user platform to deliver an installation confirmation SW installation package is authentic, i.e., generated by the ISP* License is authentic, i.e., generated by the LP, and grants the requested rights SW is integer, i.e., identical to the SW which the TTP certified Decryption of SW succeeds Internal installation in target component succeeds (details follow) Main criteria Authenticity, integrity and soundness 4 Conditions for an ISP to deliver an acknowledgment Installation confirmation is authentic, i.e., generated by the user platform Installation result was "success" Authenticity and soundness * Installation Service Provider 11
13 The user platform has an internal structure consisting of three elements: a trusted component, regular components and an internal communication network INTERNAL STRUCTURE OF THE USER PLATFORM Internal communication network User Platform OEM SAP u 0 : trusted component based on trusted computing HW u 0 UP ISP LP u 1 u 2 u n u i : regular low cost component 12
14 Internally, a SW installation within a user platform consists of three basic steps THREE INTERNAL STEPS OF A SW INSTALLATION WITHIN A USER PLATFORM u 0: Trusted component u i : Target component 1 i n u 0 u i 1 Installation instruction: Install_Instr(i,m,s enc ) mac 0 i 2 Installation IntInstConf(m) confirmation: mac i 0 SW installation succeeded internally 3 Usage UseInstr(i,m, p n ) instruction: mac 0 i Based on symmetric cryptography 13
15 The paper makes two major contributions CONCLUSION: TWO MAJOR CONTRIBUTIONS OF THE PAPER Requirements model for SW installation in embedded systems Major roles included in requirements model Compatibility of SW components and skill set of ISPs considered Basic license and DRM scheme Secure installation protocol meeting the requirements Public Key Broadcast Encryption (PKBE) for achieving non-discrimination Trusted Computing for achieving trust in user platform with little additional hardware Security analysis in Technical Report Open Problem Reduced need for TTP in setup phase by aggregating the PKBE key material bottom-up 14
Embedding Trust into Cars Secure Software Delivery and Installation
Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
Safety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Instructions on TLS/SSL Certificates on Yealink Phones
Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as
RSA Authentication for Secure Flashing of Automotive ECUs
RSA Authentication for Secure Flashing of Automotive ECUs Eduardo Ciniglio Emilio P. Mancini Umberto Villano November 17, 2010 Abstract In many embedded applications in the automotive field, there is the
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
OBM (Out of Band Management) Overview
OBM (Out of Band Management) Overview With the growth of IP, routers deployed into an IP network must not only be accessible by the network operator for maintenance and configuration purposes, but secure
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Threat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics
Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics Frank Schirrmeister, Filip Thoen [email protected] Synopsys, Inc. Market Trends & Challenges Growing electronics
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/
DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
Security for Ubiquitous and Adhoc Networks
Security for Ubiquitous and Adhoc Networks Mobile Adhoc Networks Collection of nodes that do not rely on a predefined infrastructure Adhoc networks can be formed merged together partitioned to separate
ETHERNET ENCRYPTION MODES TECHNICAL-PAPER
1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet
MDI FAQ. Version 8.1.0a Page 1 of 16
1. Why does the MDI Explorer show MDI units blinking on and off?...3 2. Will MDI program the same modules as a TECH 2?... 3 3. How and when is a SELF TEST performed on the MDI?... 3 4. What if the MDI
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Local Interconnect Network Training. Local Interconnect Network Training. Overview
Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design
Efficient and Faster PLC Software Development Process for Automotive industry Demetrio Cortese IVECO Embedded Software Design 13-06-2013 Automotive OEM Mandatory Requirement Delivery the new vehicle in
Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -
Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC
Current and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Q: Why security protocols?
Security Protocols Q: Why security protocols? Alice Bob A: To allow reliable communication over an untrusted channel (eg. Internet) 2 Security Protocols are out there Confidentiality Authentication Example:
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Credential Management for Cloud Computing
Credential Management for Cloud Computing Workshop Cloud Security, 16.07.2014 Dr. Johannes Luyken Page 1 Security breaches increase in their impact by exploiting online access to confidential data that
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Cryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics [email protected] DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
Using PI to Exchange PGP Encrypted Files in a B2B Scenario
Using PI to Exchange PGP Encrypted Files in a B2B Scenario Applies to: SAP Net Weaver Process Integration 7.1 (SAP PI 7.1). For more information, visit the SOA Management homepage. Summary This document
Vehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
Updating Car ECUs Over-The-Air (FOTA) White Paper
Updating Car ECUs Over-The-Air (FOTA) ABSTRACT As the amount of software in automobiles grows, so too does the need to effectively manage that software asset. The telecom industry has a proven solution
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
Secure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Link 2 Vehicle Maintenance System
Link 2 Vehicle Maintenance System Link 2 Data Module - Monitors Critical Vehicle Information - Records CAN J1939 data bus for engine, transmission and ABS along with aerial, PTO and generator information
www.imprezer.tk Introduction to www.union88.tk RACE FUELS Hans-Christian von der Wense Munich, Germany
Introduction to Hans-Christian von der Wense Munich, Germany Overview Progress in Automotive Electronics and it s Impacts on Networking LIN Consortium LIN Concept Physical Layer Data Link Layer LIN Network
A Survey on Optimistic Fair Digital Signature Exchange Protocols
A Survey on Optimistic Fair Digital Signature Exchange s Alfin Abraham Vinodh Ewards Harlay Maria Mathew Abstract Security services become crucial to many applications such as e-commerce payment protocols,
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
OFTP 2 Secure Data Exchange Via the Internet
OFTP 2 Secure Data Exchange Via the Internet A guideline for the practical application Version 1.1 VDA DFÜ AG Dietmar Kaschmieder Page 1 of 16 History: Version Date Description Author 1.0 04-10-2007 VDA
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
HP Data Protector Integration with Autonomy LiveVault
HP Data Protector Integration with Autonomy LiveVault Introducing cloud backup for HP Data Protector environments Technical white paper Table of contents Summary... 2 Introduction... 2 Integration concepts...
Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
Caught in the Maze of Security Standards
Caught in the Maze of ΓΝΩΘΙΣ Know Thyself ΑΥΤΟΝ Security Standards Dieter Gollmann Hamburg University of Technology What this talk is not about 1. Designing security protocols is difficult and error prone
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
Digital Rights Management Demonstrator
Digital Rights Management Demonstrator Requirements, Analysis, and Design Authors: Andre Osterhues, Marko Wolf Institute: Ruhr-University Bochum Date: March 2, 2007 Abstract: This document describes a
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Laptops on 4 wheels. New service processes for the automotive industry. Marko Weiße ProSTEP ivip Symposium 2006 26.04.2006
Laptops on 4 wheels New service processes for the automotive industry ProSTEP ivip Symposium 2006 26.04.2006 Todays independent electronic systems from different suppliers will be integrated in the future
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
