Embedded Java & Secure Element for high security in IoT systems



Similar documents
Security in ST : From Company to Products

M-Shield mobile security technology

WIND RIVER SECURE ANDROID CAPABILITY

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

M2M For industrial and automotive

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Bellevue University Cybersecurity Programs & Courses

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

PUF Physical Unclonable Functions

Chapter 1: Introduction

Hardware Security Modules for Protecting Embedded Systems

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Cisco Advanced Services for Network Security

M-Shield Mobile Security Technology: making wireless secure

PrivyLink Cryptographic Key Server *

Threat Model for Software Reconfigurable Communications Systems

Security Security by Separation

IoT Security Platform

IoT Security Concerns and Renesas Synergy Solutions

OMAP platform security features

Building A Secure Microsoft Exchange Continuity Appliance

Introducing etoken. What is etoken?

Secure web transactions system

Developing a new Protection Profile for (U)SIM UICC platforms. ICCC 2008, Korea, Jiju Septembre 2008 JP.Wary/M.Eznack/C.Loiseaux/R.

CryptoFirewall Technology Introduction

Safety and security related features in AUTOSAR

Information Security Basic Concepts

Vehicular On-board Security: EVITA Project

Consolidated security management for mainframe clouds

Cyber Security and Privacy

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

ZigBee Technology Overview

UNCLASSIFIED Version 1.0 May 2012

Fundamentals of Network Security - Theory and Practice-

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

Industry 4.0: Cyber-Security Challenges on the Horizon

Banking. Extending Value to Customers. KONA Banking product matrix. is leading the next generation of payment solutions.

W ith an estimated 14 billion devices connected to

Excerpt of Cyber Security Policy/Standard S Information Security Standards

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

e-code Academy Information Security Diploma Training Discerption

Applying Common Criteria to a cloud type payment service

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

Introduction to Cyber Security / Information Security

The Internet of Things: Opportunities & Challenges

IT Security. Securing Your Business Investments

SecureD Technical Overview

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Applied and Integrated Security. C. Eckert

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations

Deriving a Trusted Mobile Identity from an Existing Credential

Secure Network Communications FIPS Non Proprietary Security Policy

Building Robust Security Solutions Using Layering And Independence

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

FISMA / NIST REVISION 3 COMPLIANCE

CRYPTOGRAPHY AS A SERVICE

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Locking down a Hitachi ID Suite server

Secure Data Exchange Solution

Secure Hardware PV018 Masaryk University Faculty of Informatics

CPSC 467: Cryptography and Computer Security

Network Test Labs (NTL) Software Testing Services for igaming

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Securing Data in Oracle Database 12c

Security Issues with Integrated Smart Buildings

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

BroadSAFE Enhanced IP Phone Networks

Snow Agent System Pilot Deployment version

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Network Security 101 Multiple Tactics for Multi-layered Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

White Paper How Noah Mobile uses Microsoft Azure Core Services

Certification Report

ARM mbed IoT Device Platform. November 3 rd, 2014

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

NanopowerCommunications: Enabling the Internet of Things OBJECTS TALK

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Network Security Administrator

Facilitated Self-Evaluation v1.0

Protecting Your Organisation from Targeted Cyber Intrusion

Passing PCI Compliance How to Address the Application Security Mandates

Basics of Internet Security

SECURITY IN THE INTERNET OF THINGS

Where every interaction matters.

Transcription:

Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle

Speakers 2 Anne-Laure SIXOU Smartgrid Product Line Manager, ST Anne-laure.sixou@st.com Thierry BOUSQUET Smartgrid Application Leader, ST Thierry.bousquet@st.com Frédéric Vaute Master Principal Sales Consultant, Oracle Frederic.vaute@oracle.com

Session objectives 3 What is security in IoT systems? How to combine Embedded Java and a Secure Element to secure an IoT system?

Real-world Consumer IoT security today 4 Shows the importance of proper security analysis & practical pitfalls

KERKEY & Embedded Java SE for SmartGrid a pre-industrial tool for players 5 KERKEY Highly secure solution certified CC EAL4+ Flexible solution Java OS and JavaCard application Turnkey solution with Industrialization services Compliant with European & BSI smart metering requirements Host Embedded Java SE Portability on any operating system running on standard desktop system High performance system Reliable development platform highly deployed Video : Secure Smartgrid solution

General security concepts

Why security is important? 7 Security is the degree of resistance to, or protection from, harm. It applies to all vulnerable and valuable assets such as : person Home There are two reasons why security should be an important item for everyone : Personal Protection of Information Nation community Social Responsibility To protect the group you join when you connect your machine to the network

Information Technology Security main prevention of information 8 Confidentiality Integrity Availability Prevention of the unauthorized disclosure of information Prevention of the unauthorized modification of information Prevention of the unauthorized withholding of information or resources Individuals or companies expect that their personal information contained in IoT products or systems Remains private Not to be subjected to unauthorized modification Be available to them

Security concepts and relationships 9 value wish to minimize Owner evaluate that exploit Vulnerabilities / Attacks Risks Threats Countermeasures To TO PROTECT wish to abuse Assets

Designing secure systems 10 Infrastructure and set of rules Components Secure devices (e.g. Microcontrollers) performing crypto with... cryptographic keys... protected logically and physically Software on other platforms offering only limited protection to data and code Central computers: hosts Telecommunication infrastructure Set of participants, each with a specific role Every party has a set of rules he/she should follow

How to combine Embedded Java and a Secure Element to secure an IoT system?

From threats in Smart Metering 12 Fake server Commercial & cyber crime usage Disruption of administration system Data Collection & Corruption Commercial & cyber crime usage Identified Fraud empty for houses invoices Fraud for invoices Manipulated meter readings Misuse of private customer data Data Center Concentrator / Gateway Meter Fake services Supply shut down Disruption of service Spread of wrong information (e.g. invoices) Distributed denial-of-service Malicious code Fake server / device Commercial & cyber crime usage Entry Supply point for shut administration downsystem Fraud Supply shut down Data storage collection & corruption Identified empty houses Fraud for invoices Manipulated meter readings Misuse of private customer data

to Countermeasures 13 Fake server Authentication Data Collection Corruption Authenticated & encrypted communication Data Center Concentrator / Gateway Meter Fake services Secure boot / code integrity Fake server / device Authentication Data storage collection & corruption Data integrity Data confidentiality Tamper-resistance Secure life cycle

The solution with Java and ST products 14 Threats Solution Implementation & services requested Fake devices Authenticated devices Mutual authentication Data collection & corruption Fake services Data storage collection & corruption Authenticated & encrypted communications (secure channel) Robust Smart-Devices (secure boot & code integrity) Protected crypto keys & private data (data integrity, data confidentiality and tamper-resistance) Security Provisioning & Life Cycle Management Expertise SW Crypto libraries HW Crypto accelerators Robust implementations Network security protocols Evaluated / Certified Authenticated software stacks Least privilege, Sand-boxing & Isolation of assets Detection & Monitoring From PCB attacks From SW attacks From sophisticated HW attacks Provisioning of secrets in ST chips Support for sophisticated multi-stakeholders scenarios & field management

IoT requires smarter and more secure devices 15 Local intelligence and decision-making Flexible networking Performance and scalability Security Remote management Functions become services

Java platforms on ST chipsets 16 Cortex -SC Cortex -Mx ST23 Cortex -Mx ST40 Cortex -A9

Java SE Security Overview Secure and controlled code execution 17 Runtime security: Sandbox Concept Controlled code loading No file access on host, limited network access, no native code execution Security Manager / AccessController Limits access to resources and data by means of runtime security Security Policy Configurable definition of the limits of the Security Manager (permissions) Domains Act as instances of Security Policy Define access for different areas of code through source of the request

Java SE Cryptography Architecture (JCA) 18 JCA (Java Crypto Architecture) Provides an extensible, full featured API for building secure applications Algorithm and implementation independent Provider-based architecture Allows extension of Java Security to hardware based security with Secure Element Software Crypto Provider From software to hardware based security

Secure Element Growth Drivers 19 PERSONAL SECURITY EMBEDDED SECURITY SMARTCARD MOBILE CONSUMER & INDUTRIAL Contactless platform: ST31 e-flash flexibility NFC secure element: ST33 NFC combo: SE + CLF End-to-end turn key solutions Hardware, Software, Perso SE=Secure element CLF = Contact-Less Frontend

KERKEY Secure element for smartgrid system 20 Secure Personalization o Highly secure solution certified CC EAL4+ (Hardware firmware personalization) BSI Applet or CUSTOM Applet o Java platform with modular Java Card application Java Card OS JC2.2 Global Platform GP2.1.1 Secure silicon o Industrialization & Personalization services o QFN32 suitable package for Smart metering & Industrial design

Leading edge methodology for Security 21 Material / IP theft Physical attacks Fault injection Side channel analysis Secure manufacturing and development environments and flows Shields Intrusion detectors Dedicated architecture and design Detectors Crypto and product architecture and design Product life cycle management Obfuscation HW and SW countermeasures Solid crypto SW Internal & external audits, regular maintenance Internal assessment : best in class labs and methodology Silicon technology advanced analysis tools External Labs assessment - R&D projects, Technology watch Evaluation and Certification by public authorities, Common Criteria, EMVCO, FIPS

Smartgrid solution architecture 22 Energy Provider data Center Concentrators (TLS server) Secure Smart meters (TLS client) STIH416 processor : Cortex -A9 Linux + Java SE Embedded + ST Kerkey Java Card + Global Platform v2 ST STM32 + ST Kerkey Java Card + Global platform v2

High level Security can be reached if Kerkey is added to Java solution 23 Threats Solutions Java Fake Devices Authenticated Devices Kerkey + Java Kerkey Implementation Mutual authentication STD HIGH Java key store is protected inside Kerkey Expertise STD HIGH AES & SHA-3 inventors are ST employees Data collection & corruption Fake Services Data storage collection & corruption Authenticated & Encrypted Communications (secure channel) Robust Smart-Devices (secure boot & code integrity) Protected Crypto Keys & private data Security Provisioning & Life Cycle Mgt SW Crypto libraries STD HIGH New security provider can be added to JCE/JCA to extend cryptographic features with Kerkey HW Crypto accelerators NA HIGH In ST products Robust implementations HIGH HIGH Including tamper-resistant Secure uc Network security protocols STD HIGH Available for ST products Evaluated / Certified NA HIGH Authenticated Software Stacks STD HIGH Least privilege, Sand-boxing & Isolation of assets NA HIGH Some products, IPs & libraries evaluated by third parties or Common Criteria certified Secure boot, flash protection & dedicated TPMs Secure Firmware Upgrade & Protected JTAG Hardware filters and firewalls, dedicated security subsystems, Trusted Execution Environment, TrustZone technology, dedicated Secure Elements & Secure uc Detection & Monitoring NA HIGH Tamper-detection & environmental sensors in some products From PCB attacks NA HIGH On-chip storage with envm scrambled and encrypted, HW secure protection From SW attacks NA HIGH From sophisticated HW attacks NA HIGH Secrets provisioning in ST chips Support for sophisticated multistakeholders scenarios & field management NA NA HIGH HIGH Hardware filters and firewalls, dedicated security subsystems, Trusted Execution Environment, TrustZone technology, dedicated Secure Elements & Secure uc Tamper-resistant & third-party evaluated security subsystems Dedicated, tamper-resistant and CC-certified Secure uc Programming of crypto keys by ST at manufacturing Secure Manufacturing Environment Global Platform Compliant Tamper-resistant Secure Element (SE) and secure SW for SoCs Trusted Execution Environment (TEE) for SoCs

Exemple of high level security Java solution with Kerkey 24 Threats Solutions Java Kerkey + Java Kerkey Implementation Fake Devices Mutual authentication STD HIGH Java key store is protected inside Kerkey Data collection & corruption SW Crypto libraries STD HIGH New security provider can be added to JCE/JCA to extend cryptographic features With Kerkey

Typical Software architecture Meter MCU or Concentrator MPU Secure element Kerkey 25 Java application JCE/JCA Java Card application : smart metering SUN PKCS#11 Provider Java SE or ME ST PKCS11 Middleware Java Card 2.2 GP 2.1.1 Operating system Operating system Serial link ISO7816 or I2C

Demo for developpers Demo usage of Kerkey secure element with Java SE & Java card 26 Demo 1 : Open a secure session from Java Read CPLC data's are often used to identify the chip in the field Demo 2 : Generation of certificate signature request using Kerkey A certificate is an electronic document used to prove ownership of a public key It allows to authenticate documents, open secure channel SSL, etc,,, Certificate signature request is one part of the creation of the certificate It allows newly generated signature to be signed by Certificate Authorities. Demo using :

Conclusion

and the future 28 From security in Smart metering to security in IoT or IT systems For more information of how to address Smart Home system, visit Universal Development Kit for Creating and Deploying Smart Home/Building Applications [CON2405] session

Contacts 29 Join ST people USA : Serge.fruhauf@st.com APAC : Bruno.batut@st.com EMEA : Fabrice.gendreau@st.com Japan / Korea : Michel.faure@st.com www.st.com / kerkey