<t base Trusted Application Development
|
|
- Emory Greene
- 8 years ago
- Views:
Transcription
1 <t base Trusted Application Development Prepared for: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen am in München Markus Katzenberger Project Manager Trustonic GmbH 1
2 Agenda Who we are The Trusted Execution Environment TEE <t-base OTA Ecosystem Typical Use Cases for TEE <t-base architecture and APIs <t-base devices 2
3 Trustonic EXECUTIVE TEAM Ben Cade CEO Olivier Leger EVP Sales & Marketing Chris Jones COO Stephan Spitz EVP Engineering Jon Geater CTO OVER 100 EMPLOYEES LOCATED BETWEEN Cambridge, London, Maidenhead, Bath Munich Helsinki Tokyo Seattle, Austin, San Francisco Sophia, Paris Seoul Taipei 3
4 Trustonic EXECUTIVE TEAM Seattle, Austin, San Francisco Ben Cade CEO Olivier Leger EVP Sales & Marketing 2 years of Trustonic (Dec 2012 Dec 2014) Munich Chris Jones COO Stephan Spitz EVP Engineering What an amazing 2 years it s been. Helsinki Jon Geater CTO Trustonic OVER 100 EMPLOYEES technology LOCATED can already BETWEEN be found in over 300 Million smart devices and our growing ecosystem of service providers Cambridge, London, Tokyo stands at over Maidenhead, 50 companies Bath spanning enterprise, content protection, commerce and identity management segments. So, thank you to our partners for helping to establish this common Seoul Sophia, foundation Paris of trust in devices Now 2015 promises to be a year full of opportunity for those looking to deliver Taipei trust enhanced experiences to the masses! 4
5 Why use a TEE? Key assets exposed Key assets protected LOGO COLOR VERSIONS SMART CONNECTED DEVICE Normal App Security Critical Assets LOGO TEE Enabled App API Call on Security critical Routine Secure Container Trusted App - Secured Critical Assets Isolated space for handling high value assets MAIN OPERATING SYSTEM TRUSTONIC TEE LOGO IN BLACK LOGO ON BLACK TRUSTZONE SYSTEM-ON-CHIP 5
6 Where does t-base fit? A/V OUTPUT LOGO IN BLACK SMART CONNECTED DEVICE TRUSTZONE SYSTEM-ON-CHIP APPLICATIONS LOGO ON PROCESSOR BLACK NFC BLUETOOTH WI-FI RADIO MASS STORAGE SECURE ELEMENT LOCATION SENSOR BASEBAND RADIO TOUCHSCREEN SENSOR BIOMETRIC SENSOR 6
7 The Ecosystem <t-directory <t-kph TAM SERVICE PROVIDERS <t-dev DEVICE MAKER LOGO COLOR VERSIONS APP DEVELOPERS <t-sdk LOGO <t-base CHIP MAKER APP STORE LOGO IN BLACK LOGO ON BLACK SILICON IP END USERS 7
8 8 Use Cases for t-base TEE
9 Content Protection Content Service DTCP/IP LOGO COLOR VERSIONS LOGO Link Protection MAIN OS LOGO IN BLACK SMART CONNECTED DEVICE TEE Enabled Content Service App DRM and Media Framework APIs TRUSTZONE SYSTEM-ON-CHIP LOGO ON BLACK Secure Container DRM Decryption TRUSTONIC TEE Secure Playback Secure Boot Device Authentication User Authentication DRM Protection Trusted time source Secure Playback Link Protection DTCP Downloadable Scheme Trustonic protects video path from studio to user 9
10 Payments LOGO COLOR VERSIONS SMART CONNECTED DEVICE LOGO TEE Enabled Wallet App Secure Container Signed Sealed User Input Data API Call to Authenticate User Login/Password or Biometric Secure Input MAIN OS TRUSTONIC TEE LOGO IN BLACK LOGO ON BLACK TRUSTZONE SYSTEM-ON-CHIP 10 Trustonic protects PINs and Passwords and access to Biometric sensors
11 Enterprise LOGO GO COLOR VERSIONS APPLICATION LEVEL 2 Factor User Authentication Identity Management Authorization and SSO Physical access control with HCE Secure messaging: Voice and Data Data loss prevention SYSTEM LEVEL Secured dual persona Secured MDM and MAM Biometric matching LOGO IN BLACK LOGO ON BLACK DEVICE LEVEL Secure boot and integrity checks Bulk storage encryption Biometric hardware interfaces 11
12 Automotive Mobile as car remote control BLUETOOTH LE NFC Identity Management PIN/Fingerprint Unlock Remote Lock/Unlock Car personalization Performance and comfort Insurance Interface Driver risk profiled discounts Location based payments Parking Fuel/recharging Road tolls Premium Traffic information Entertainment Movies Apps 12
13 Internet of Things ENERGY BROKERAGE ADVERTISER HOME GATEWAY APPLIANCE MAKER HOME INSURER CONNECTION REQUESTS AUTHORIZATIONS SMART DEVICE GATEWAY User controls who can access what data Authentication Authorization Energy suppliers bid for contracts Smart meter Appliances request service Insurers discount on occupancy User location Temperature SMART METER THERMO- STAT CONNECTED APPLIANCES 13
14 Healthcare Health card Identity/Authorization Secure access to records Sensors and monitoring Privacy protected activity logging Secure connection to medical equipment Secure Storage of medical data MEDICAL EQUIPMENT 14
15 Trusted Application Development 15
16 <t-base Architecture Normal-World Application Secure-World Container Trusted Application Connector TCI Trusted Application <t-base Client API Trusted Application API <t-base daemon kernel COM System Crypto Security <t-base driver MCI <t-base OS ARM TrustZone enabled SoC 16
17 Development Tools TA Development <t-sdk (header files, libs, sample code, scripts) ARM DS-5 for compiling and debugging GNU GCC for compiling Secure Driver Development <t-ddk (header files, libs, sample code, scripts) ARM DS-5 for compiling debugging via JTAG according to SoC Tools Normal-World Development Existing Android driver is open-source Normal-World OS tools should be used 17
18 <t-base Normal world Normal-World Application Trusted Application Connector Memory Session Device <t-base Client API Device Access Session Management Memory Mapping <t-base Client API <t-base daemon kernel <t-base driver 18
19 <t-base Secure World Trusted Application API COM a set of functions for inter-world communication System <t-base system information and functions Crypto <t-base crypto provider Security Secure object functions for binary data Secure-World Containers Trusted Application Trusted Application API Security Crypto System COM <t-base OS 19
20 20 <t-base-300 GlobalPlatform API
21 GlobalPlatform API In addition to the <t-base-2xx APIs, <t-base 300 introduced the key GP features that are already standardized TEE Client API for client applications TEE Internal API for TA Cryptography Trusted Storage Memory Management Equivalent functionality of what is already available to develop Trusted Applications on <t-base-2xx 21
22 TEE Client API TEEC_InitializeContext TEEC_FinalizeContext TEEC_OpenSession TEEC_CloseSession TEEC_InvokeCommand TEEC_AllocateSharedMemory TEEC_RegisterSharedMemory TEEC_ReleaseSharedMemory 22
23 TEE Internal API: TA Interface TA_CreateEntryPoint TA_DestroyEntryPoint TA_OpenSessionEntryPoint TA_CloseSessionEntryPoint TA_InvokeCommandEntryPoint Trusted Applications are multi-instance 23
24 TEE Internal API: Memory Mgmt. Functions TEE_CheckMemoryAccessRights TEE_SetInstanceData TEE_GetInstanceData TEE_Malloc TEE_Realloc TEE_Free TEE_MemMove TEE_MemCompare TEE_MemFill 24
25 TEE Internal API: Object Functions TEE_GetObjectInfo TEE_GetObjectBufferAttribute TEE_GetObjectValueAttribute TEE_CloseObject TEE_AllocateTransientObject TEE_FreeTransientObject TEE_ResetTransientObject TEE_PopulateTransientObject TEE_InitRefAttribute TEE_InitValueAttribute TEE_CopyObjectAttributes TEE_GenerateKey TEE_OpenPersistentObject TEE_CreatePersistentObject TEE_CloseAndDeletePersistentObject TEE_ReadObjectData TEE_WriteObjectData TEE_TruncateObjectData TEE_SeekObjectData 25
26 TEE Internal API: Cryptographic Functions TEE_AllocateOperation TEE_FreeOperation TEE_GetOperationInfo TEE_SetOperationKey TEE_DigestUpdate TEE_DigestDoFinal TEE_CipherInit TEE_CipherUpdate TEE_CipherDoFinal TEE_MACInit TEE_MACUpdate TEE_MACComputeFinal TEE_MACCompareFinal TEE_AsymmetricEncrypt TEE_AsymmetricDecrypt TEE_AsymmetricSignDigest TEE_AsymmetricVerifyDigest TEE_GenerateRandom Keys must be transient objects 26
27 <t-base devices Arndale development board Exynos 5250 SoC System or Service Provider TAs Driver development Commercial Devices Each device must be added to Trustonic test infrastructure TA can be bundled in your APK in the /res folder We will support demos and POCs We can advise on suitable devices CONFIDENTIAL
Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014
Verfahren zur Absicherung von Apps Dr. Ullrich Martini IHK, 4-12-2014 Agenda Introducing G&D Problem Statement Available Security Technologies Smartcard Embedded Secure Element Virtualization Trusted Execution
More informationSymbian phone Security
ITSX Overview Symbian OS. Risks and Features. Taking it apart. Conclusions. Symbian History Psion owner of EPOC OS, originally from 1989, released EPOC32 in 1996 EPOC32 was designed with OO in C++ 1998:
More informationBUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.
BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.
More informationM-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
More informationSECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationMobile Sicherheitein sicheres Ecosystem für die mobile Kommunikation
Giesecke & Devrient Mobile Sicherheitein sicheres Ecosystem für die mobile Kommunikation 22.04.2010 Dr. Kai Grassie SVP, CTO Darmstadt, 13.12.2012 Contents G&D: Who we are Innovation accelerates: From
More informationAndroid Virtualization from Sierraware. Simply Secure
Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility
More informationBusiness Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.
Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationSecure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.
Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password
More informationDOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations
DOWNLOAD COURSE PRESENTATIONS 2 Scan to download course presentations ZYNQ OS SUPPORT 3 AGENDA 4 > OS/Ecosystem Overview > Xilinx Petalinux/OSL > AMP Reference Design Information > Linux Partial Reconfiguration
More informationSierraware Overview. Simply Secure
Sierraware Overview Simply Secure Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization,
More informationEESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.
EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple
More informationH MICRO CASE STUDY. Device API + IPC mechanism. Electrical and Functional characterization of HMicro s ECG patch
H MICRO CASE STUDY HMicro HMicro is a wireless healthcare chip company to enable industry s first fully disposable wireless patches with high reliability, high data integrity, low cost, small form factor
More informationPOPP Hub Gateway. Manual
POPP Hub Gateway Manual 008900 POPP Hub Gateway Manual Quick Start... 2 Hardware... 2 Smart Home User Interface... 2 Applications (Apps) realize the intelligence of your Smart Home... 3 Functions of the
More informationAndroid pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
More informationCHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution
More informationm Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
More informationAn Example of a Derived Credentials Architecture
An Example of a Derived Credentials Architecture Francisco Corella, PhD fcorella@pomcor.com Karen Lewison, MD kplewison@pomcor.com Original: March 31, 2014; updated: April 27, 2014 Abstract NIST has released
More informationSecurity in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
More informationEMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
More informationInternet Of things. Petr Ulvr, petr.ulvr@intel.com Business Development Manager Intel Corp. CEE New Biz Virtual Team
Internet Of things Petr Ulvr, petr.ulvr@intel.com Business Development Manager Intel Corp CEE New Biz Virtual Team Intel s vision If it is smart and connected, it is best with Intel. Data Center/Network
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationBuilding Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.
Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationMobileIron and Samsung Value Proposition
MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global
More informationMobile Cloud Computing
Mobile Cloud Computing Dr Samia Bouzefrane Laboratoire CEDRIC CNAM, 292 rue Saint Martin http://cedric.cnam.fr/~bouzefra samia.bouzefrane@cnam.fr 1 Agenda Mobile Cloud computing Mobile trusted computing
More informationTrack One Building a connected home automation device with the Digi ConnectCore Wi-i.MX51 using LinuxLink
Track One Building a connected home automation device with the Digi ConnectCore Wi-i.MX51 using LinuxLink Session 1 Assembling and booting a small footprint Linux platform To join the teleconference -------------------------------------------------------
More informationWireless networks that make sense Complete semiconductor solutions for wireless sensor networks
Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks 2011 www.dialog-semiconductor.com Technology benefits Easy to install and use, perfect for self-installed
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationSecure Cloud and Remote Service Connections for AllJoyn Applications
Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 12 November 2014 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group
More informationARM mbed IoT Device Platform. November 3 rd, 2014
ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the
More informationReminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
More informationWireless networks that make sense Low-energy semiconductor solutions for wireless sensor networks
Wireless networks that make sense Low-energy semiconductor solutions for wireless sensor networks 2011 www.dialog-semiconductor.com Technology benefits Ultra-low-energy technology based on proven DECT
More informationComprehensive Security for Internet-of-Things Devices With ARM TrustZone
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex
More informationProtect Your Mobile World
Protect Your Mobile World Doward Wilkinson Mobile Strategic Trend s May, 2012 1 It is a Fact We Live in a Mobile World People Devices Apps Access Payments Commerc Market e Opportuni At Risk ty 2 In the
More informationSecure Cloud and Remote Service Connections for AllJoyn Applications
Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 5 February 2015 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group
More informationQuestions from The New SensorTag - IoT Made Easy Webinar
Questions from The New SensorTag - IoT Made Easy Webinar Are there any plans to make a Windows API available (preferably portable for use in Windows 10 Universal applications) It is in our queue of projects,
More informationPervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
More informationMobile and Embedded/IoT market Overview and Trends. June 2014
Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum
More informationBlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
More informationCycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
More informationSmart Systems: the key enabling technology for future IoT
Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London
More informationIntroduction to Silicon Labs. November 2015
Introduction to Silicon Labs November 2015 1 Company Background Global mixed-signal semiconductor company Founded in 1996; public since 2000 (NASDAQ: SLAB) >1,100 employees and 11 R&D locations worldwide
More informationMobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
More informationPenetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
More informationCSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel
CSE597a - Cell Phone OS Security Cellphone Hardware William Enck Prof. Patrick McDaniel CSE597a - Cellular Phone Operating Systems Security - Spring 2009 - Instructors McDaniel and Enck 1 2 Embedded Systems
More informationTraining. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
More informationARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM
ARM Processors and the Internet of Things Joseph Yiu Senior Embedded Technology Specialist, ARM 1 Internet of Things is a very Diverse Market Human interface Location aware MEMS sensors Smart homes Security,
More informationDeriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
More informationIoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
More informationWeak Spots in Enterprise Mobility Management Dennis Schröder
Weak Spots in Enterprise Mobility Management Dennis Schröder Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dennis Schröder, M. Sc. IT Security Business Security & Privacy Product Manager
More informationWindows Phone 8 Security deep dive
October 2012 Windows Phone 8 Security deep dive David Hernie Technical Evangelist Microsoft Belux Office Microsoft Corporation All large screen, dual-core, LTE and NFC Nokia Lumia 920 Nokia Lumia 820 Samsung
More informationNFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
More informationIn the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
More informationMXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
More informationLecture 2 PLATFORM SECURITY IN ANDROID OS
Lecture 2 PLATFORM SECURITY IN ANDROID OS You will be learning: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation
More informationSpecialized Android APP Development Program with Java (SAADPJ) Duration 2 months
Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months Our program is a practical knowledge oriented program aimed at making innovative and attractive applications for mobile
More informationTechnical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationComputer Automation Techniques. Arthur Carroll
Computer Automation Techniques Arthur Carroll 1 Three Types of Computers Micro-Controller Single Board Computer Desktop Computer 2 The Micro-Controller Small inexpensive DIP or surface mount chips Roughly
More informationThe Impact of IoT on Semiconductor Companies
Advisory The Impact of IoT on Semiconductor Companies Rajesh Mani Director, Strategy and Operations April 15, 2015 The Internet of Things (IoT) has been defined in multiple ways here s our take! The collection
More informationConfidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator
Confidentio Integrated security processing unit Including key management module, encryption engine and random number generator Secure your digital life Confidentio : An integrated security processing unit
More informationSecurity Requirements in the Era of Mobile communication The case of the financial industry
Security Requirements in the Era of Mobile communication The case of the financial industry 7th February 2012 Dr. Kai Grassie, CTO Agenda Development and status of Mobile Payment Technology-Trends in Mobile
More informationBlackBerry 10.3 Work Space Only
GOV.UK Guidance BlackBerry 10.3 Work Space Only Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network architecture
More informationAndroid on i.mx Applications Processors
July 2009 Android on i.mx Applications Processors Sridharan Subramanian Senior Product Manager Software and Platforms Abstract Android is a software platform and operating system for mobile devices, based
More informationDell Wyse Cloud Connect
Dell Wyse Cloud Connect Secure productivity from work, home, and on the go. The ultra-compact personal cloud device that can make any HDMI/MHL-equipped display your own. For personal access to all of your
More informationThreat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
More informationWireless networks that make sense Complete semiconductor solutions for wireless sensor networks
Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks The right choice for wireless networks Wireless networking is an emerging, fast-growing market, and is making
More informationEn Wireless Mobile Utility (Android) User s Manual. D610, D600, D7100, D5300, D5200, D3300, Df 0 2 26
1 En Wireless Mobile Utility (Android) User s Manual Install the Wireless Mobile Utility on your smart device (smartphone or tablet) to download pictures from a camera or take pictures remotely. The Wireless
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationSymbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4
Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4 Updated: May 31, 2011 Contents This document describes the Cisco AnyConnect Secure Mobility Client 2.4 for devices running Symbian.
More informationNetworking Services Trusted at every level and every phase
Networking Services Trusted at every level and every phase freescale.com/netservices Networking Services Overview Freescale has over 1000 in-house software resources providing networking expertise, software
More informationMobile Application Security
Mobile Application Security Rebecca Finnin, AT&T ISACA Geek Week 08/20/2013 AGENDA Mobile Application Development Review Gartner Framework of Mobile App Development Challenges Outline Security Implications
More informationFinal Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
More informationTechnology.Transfer.Application.
Technology.Transfer.Application. Steinbeis Research Center Elektromobility and Information Systems 2015 Steinbeis Technology. Transfer. Application. www.steinbeis.de Open and Secure Operating for mobility
More informationDeveloping for MSI Android Devices
Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using
More informationKey & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
More informationIntroduction to Trusted Execution Environments (TEE) IY5606
Introduction to Trusted Execution Environments (TEE) IY5606 Steven J. Murdoch Computer Laboratory Learning objectives Trusted Execution Environment (TEE) Understand what a TEE is and why it is of interest
More informationM-Shield Mobile Security Technology: making wireless secure
WHITE PAPER Jerome Azema Distinquished Member of Technical Staff WTBU Chief Technology Office - Security Texas Instruments Gilles Fayad Worldwide Strategic Marketing Manager, Mobile Platform Security and
More informationAllJoyn Android Environment Setup Guide
80-BA001-2 Rev. A June 21, 2011 Submit technical questions at: http:///forums The information contained in this document is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License;
More informationZigBee Technology Overview
ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification
More information2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics
ARTIK TM The Ultimate Platform Solution for IoT 2015. 9. 17 MyungKoo Kang (VP) Samsung Electronics Future Changes from IoT Privacy in the Web Security in SmartGrill 2 IoT Market Forecast ($T) 7 6 5 4 3
More informationHow To Use An Atmel Atmel Avr32848 Demo For Android (32Bit) With A Microcontroller (32B) And An Android Accessory (32D) On A Microcontroller (32Gb) On An Android Phone Or
APPLICATION NOTE Atmel AVR32848: Android Accessory Demo 32-bit Atmel Microcontrollers Features Control an accessory from an Android device Send data to and from an Android device to an accessory Supported
More informationSSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY
SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between
More informationEnhanced Project Management for Embedded C/C++ Programming using Software Components
Enhanced Project Management for Embedded C/C++ Programming using Software Components Evgueni Driouk Principal Software Engineer MCU Development Tools 1 Outline Introduction Challenges of embedded software
More informationCS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup Emmanuel Agu What is Android? Android is world s leading mobile operating system Google: Owns Android, maintains it, extends
More informationIntegrating Mobile into Your Cross- Platform Strategy with Qt
Integrating Mobile into Your Cross- Platform Strategy with Qt Tuukka Ahoniemi Technical Product Marketing Manager tuukka.ahoniemi@theqtcompany.com Qt Developer Days 2014 Agenda Qt and Mobile Platforms
More informationBLE113 DEVELOPMENT KIT
BLE113 DEVELOPMENT KIT QUICK START Thursday, 14 March 2013 Version 1.5 Copyright 2000-2013 Bluegiga Technologies Bluegiga Technologies reserves the right to alter the hardware, software, and/or specifications
More informationEn Wireless Mobile Utility (Android) User s Manual. D750, D610, D600, D7200, D7100, D5500, D5300, D5200, D3300, Df 0 2 31
1 En Wireless Mobile Utility (Android) User s Manual Install the Wireless Mobile Utility on your smart device (smartphone or tablet) to download pictures from a camera or take pictures remotely. The Wireless
More informationCreating a More Secure Device with Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc.
Creating a More Secure Device with Windows Embedded Compact 7 Douglas Boling Boling Consulting Inc. About Douglas Boling Independent consultant specializing in Windows Mobile and Windows Embedded Compact
More informationTake your Work along with Connected Mobility
Take your Work along with Connected Mobility A dedicated Mobility arm, 7 state of the art testing labs across 3 continents, award winning mobility solutions, an app store with 30,000+ apps and 15+ providers
More informationSoftware Prerequisites Linux Ubuntu 12.04 LTS. Estimated completion time: 15min. The goal of this hands-on is to:
TRAINING MANUAL Using SAM-BA for Linux on SAMA5D3 Xplained AN-8995 Prerequisites Hardware Prerequisites Atmel SAMA5D3 Xplained USB serial TTL adapter (optional) FTDI TTL-232R-3V3 USB to TTL serial cable
More informationRoverPal - A Mobile Payment Application
White Paper RoverPal - A Mobile Payment Application Introduction Online shopping has been a favorable experience with most of us. Still, we come across instances where we are out on shopping and we run
More informationNXP s Solution to ecall Brussels, October 19 th, 2010
NXP s Solution to ecall Brussels, October 19 th, 2010 Agenda The Mission of NXP and its Partners NXP s ecall platform Awareness the Next Step Conclusions NXP leads innovation in Telematics Breakthrough
More informationEnterprise Mobility S.E.A.L / Galaxy S III
Enterprise Mobility S.E.A.L / Galaxy S III B2B Division, Solution Sales Samsung Electronics, Nordics Kenneth Broberg Nov 2012 2 Worldwide Results 313 Million mobile devices shipped in 2011, as the world
More informationThe Trusted Execution Environment:
The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market White Paper June 2015, revised from February 2011 secretariat@globalplatform.org www.globalplatform.org
More informationMobile Device as a Platform for Assured Identity for the Federal Workforce
Mobile Device as a Platform for Assured Identity for the Federal Workforce Dr. Sarbari Gupta President and CEO, Electrosoft U.S. Army Information Technology Agency (ITA) Security Forum Fort Belvoir Electrosoft
More information