TrustZone, TEE and Trusted Video Path Implementation Considerations. Michael Lu, Business Development Director, Trustonic Ltd.

Similar documents
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

<t base Trusted Application Development

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK,

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

M-Shield mobile security technology

Sierraware Overview. Simply Secure

EZCast Universal WiFi Display Dongle Quick Instal ation Guide Ver. 1.3

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Digital Transmission Content Protection (DTCP) Technical and Licensing Overview

M-Shield Mobile Security Technology: making wireless secure

Whitepaper. NVIDIA Miracast Wireless Display Architecture

High Performance or Cycle Accuracy?

Content Protection and Security Considerations for 5G KILROY HUGHES

Embedded Java & Secure Element for high security in IoT systems

Android Virtualization from Sierraware. Simply Secure

ARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi

WIRELESS TV STREAMING BOX

Availability For Network Function Virtualization. Alon Bernstein Distinguished Engineer Cisco Systems

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

demonstrations of service offerings and in public comments made during advisory committee meetings.

ZigBee Technology Overview

Reducing Configuration Complexity with Next Gen IoT Networks

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Content Protection in Silverlight. Microsoft Corporation

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

MovieLabs Specification for Enhanced Content Protection Version 1.0

ARM Architecture for the Computing World: From Devices to Cloud. Roy Chen Director, Client Computing ARM

Security Requirements in the Era of Mobile communication The case of the financial industry

Embedded Development Tools

ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics

Trusted Platforms for Homeland Security

OMAP platform security features

Fragmented MPEG-4 Technology Overview

4K Network Security Proposal. UXTC - Technical Planning Group Sony Electronics 8/5/2014

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

Android builders summit The Android media framework

4K Network Security Proposal Discussion with Studios. UXTC - Technical Planning Group Sony Electronics 8/10/2014

How to Choose the Best DRM Software For Your Mobile Application

big.little Technology Moves Towards Fully Heterogeneous Global Task Scheduling Improving Energy Efficiency and Performance in Mobile Devices

H MICRO CASE STUDY. Device API + IPC mechanism. Electrical and Functional characterization of HMicro s ECG patch

Wowza Media Systems provides all the pieces in the streaming puzzle, from capture to delivery, taking the complexity out of streaming live events.

Which ARM Cortex Core Is Right for Your Application: A, R or M?

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

ARM Processor Evolution

Mobile Device as a Platform for Assured Identity for the Federal Workforce

GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS

Security Technology for Smartphones

Achieving DRM Robustness. securing the device from the silicon up to the application

Threat Model for Software Reconfigurable Communications Systems

Smartphone Security. A Holistic view of Layered Defenses. David M. Wheeler, CISSP, CSSLP, GSLC. (C) 2012 SecureComm, Inc. All Rights Reserved

Android on i.mx Applications Processors

DLNA for Streaming Subscription TV Content in the Home

Router Architectures

Mobile Sicherheitein sicheres Ecosystem für die mobile Kommunikation

Delivering Pay TV Content throughout the Connected Home Amol Bhagwat

Sectra Communications ensuring security with flexibility

IoT Security Concerns and Renesas Synergy Solutions

General Content Security & Service Implementation

Hybrid Platform Application in Software Debug

big.little Technology: The Future of Mobile Making very high performance available in a mobile envelope without sacrificing energy efficiency

Snapdragon Developer Program

S E P T E M B E R

Design for Success: Designing for the Internet of Things with TiWiConnect

DLNA for HD Video Streaming in Home Networking Environments

About Sectra Communications

Fujisoft solves graphics acceleration for the Android platform

How Secure is Authentication?

Microsoft Smooth Streaming

WIND RIVER SECURE ANDROID CAPABILITY

Development With ARM DS-5. Mervyn Liu FAE Aug. 2015

7 Things You Need to Know about Virtual Mobile Infrastructure

Nokia Mobile Software Strategy

Making Multicore Work and Measuring its Benefits. Markus Levy, president EEMBC and Multicore Association

Agile IP Video Delivery: Redefining STB Software Architecture. December 2012 Espial Group All rights reserved

DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations

Low power GPUs a view from the industry. Edvard Sørgård

DIRECTV Set Top Box and Content Protection Description

LOOKING FOR AN AMAZING PROCESSOR. Product Brief 6th Gen Intel Core Processors for Desktops: S-series

Hardware accelerated Virtualization in the ARM Cortex Processors

Microsemi Security Center of Excellence

Implementation of a Video On-Demand System For Cable Television

Complete Integrated Development Platform Copyright Atmel Corporation

Programación de Sistemas Empotrados y Móviles (PSEM)

UEFI on Dell BizClient Platforms

Key & Data Storage on Mobile Devices

DesignWare IP for IoT SoC Designs

Mobile Device Management and Security Glossary

SNAPPIN.IO. FWR is a Hardware & Software Factory, which designs and develops digital platforms.

EMV-TT. Now available on Android. White Paper by

SierraVMI Sizing Guide

How mobile operators can monetize 3G investments through an effective applications platform

Getting Started with RemoteFX in Windows Embedded Compact 7

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Measy A2W user s manual. For Windows OS devices:

Introduction to Android

Embedding Trust into Cars Secure Software Delivery and Installation

Transcription:

TrustZone, TEE and Trusted Video Path Implementation Considerations Michael Lu, Business Development Director, Trustonic Ltd.

Agenda Content Distribution Ecosystem Overview Ecosystem overview Relevance of TEE as Trusted Media Playback Platform TrustZone and Trusted Video Path implementation considerations Secure video playback and architecture requirements TrustZone Ready Architecture Blueprints Mali V500 and TZC400, additional IP required Partner solutions Trustonic TEE and <t-play 2 CONFIDENTIAL

Content Distribution Ecosystem Overview

Stakeholder and Assets needing protection Content Rights Holders Media Content Usage Policy Content Aggregators and Service providers Media Content, Usage policy Platform Metadata, User Info and Entitlements Content Protection Solution Providers Media Content, Usage Policy, Platform Metadata, User Info, Entitlements, DRM secrets such as device/application keys, licenses etc.

TEE as Trusted Media Playback Platform The Device must implement a set of security features to enable protection of media content rendering path on the device, such that content decryption to decode, decompression and rendering/output to external links, is protected from unauthorised software and hardware components; The Device must implement a set of security features to enable robust DRM implementations to protect assets such as usage policy, account info, DRM application secrets and keys which allow media access; Device Security features and assets must be protected against tampering and modification by other unauthorized software and hardware components controlled by unauthorized software on the device. Device Security Features, where possible, should not adversely affect user experience, system renewability or increase significantly device implementation cost.

How TEE protects assets Sensitivity in DRM TEE protection principles HW Root Of Trust Part of Secure Boot Process DRM Secure DRM Code Execution DRM Cryptography (e.g DRM private keys) Secure DRM States Storage Hardware-based isolated environment TEE secure storage and secure key management API TEE secure storage Secure date/time Secure clock management Secure playback Link protection Secure configuration of Hardware Firewall DTCP/IP and HDCP SW and configuration executed in TEE Link protection Miracast: Wi-Fi wireless Display

Standardisation through GlobalPlatform GP Premium Content Task Force supported by major studios. Intended Outputs are: Standardise APIs for trusted video path access by DRM applications; Rich environment Media Player Application Media Buffers Trusted environment DRM TA Link Control Media Buffer View Provide a set of security features to enable robust DRM implementations; Support downloadable and interoperable DRMs. Certification and Compliance regime. TEE Client API Communications stack Messages Platform/ Hardware Media Playback TEE 7

TrustZone and Trusted Video Path Implementation Considerations

Trusted Video Path Requirement End to end video path, from decryption to decode, decompression and rendering/output to external links, must be hardware isolated such that content is protected from unauthorised software processes and other hardware components; Memory buffers used in the processing, decoding, mixing and rendering of the content need to be protected by a hardware access control engine such that buffers are not accessible to other unauthorised software or hardware components. Output is only allowed to internal display or exported via protected links such as HDCP and DTCP. Firmware associated with decoders, mixers and renderers, and any software component such as DRM agents, directly used in setting up the protected memory path should be protected against tampering, including having critical components placed in secure processing space, or integrity checked and monitored at boot time and/or at runtime, or equivalent measures 9

What s Required and where Premium Content DRM Video Codec Display Firmware protected against tampering Any SW component directly used in setting up protected memory path Unencrypted content protected After DRM protection removed Memory buffers protected by HW control All memory used in processing, decoding, mixing and rendering Decoders, mixers, renderers, DRM Critical components placed in secure processing space Unencrypted content never accessible to processes running in HLOS Sufficient memory for video bitstream and frame buffer Not accessible by HLOS or unauthorised HW or SW Integrity checked at boot time Unencrypted content only ever written to protected memory Output only to internal display or via protected export clients such as HDCP and DTCP

ARM TrustZone Architecture Software Architecture Normal World Secure World Hardware security to run Trusted Apps Secure OS isolated from HLOS by CPU HW HW protection from common SW Attacks Can be used to secure video path, Clock, RAM, SD/Storage, etc. Wide Adoption and standardisation Apps which use TrustZone will have both a normal world App + a Trusted App Standardized in GlobalPlatform GP Client APIs allows communication between Normal World & Secure World Trusted Apps have access to Protected Memory and Normal World memory

TrustZone Is System-wide Security Trusted Base System Architecture v1 TrustZone-Enabled CPU Core TrustZone-Aware L2 cache controller TrustZone-Aware AXI Interconnect Fabric Secure-World Memory (in addition to Normal World memory) TrustZone-Aware Interrupt Controller On-chip OTP protection for encryption and signature keys On-SoC ROM protection for Trusted Boot Code Off-SoC Memory Address Space Control Secure Debug Control Disable debug of Secure World

Components Needed for Trusted Media Path TEE Software (e.g. Trustonic TEE Solution) Video Decoder supporting TrustZone Memory Buffer Hardware Access Control Mechanism Display Controller Supporting TrustZone for local screen rendering HDCP/DTCP Link Protection for exporting content

TrustZone Ready Program Market Requirements Desired Services Industry Factors Security Design Blueprints SoC Checklist TEE Integration SoC Platform Implementation Industry Certification SoC Platform Assurance Interoperability Standard APIs 14

ARM Mali-V500 Mass Market HD Video System perspective to power reduction 50% lower memory bandwidth with ARM Frame Buffer Compression(AFBC) in Video+Display Small area Video for lowest cost and power 1080p60 encode/decode to 4K120 Optimized for real embedded systems Latency tolerant design no dropped frames High quality IP from ARM 250 200 150 100 50 0 Bandwidth [MByte/Sec] 2x Bandwidth Savings No AFBC Mali-V500 + AFBC in System Secure video path Optimized for TrustZone secure media use cases

CoreLink TZC-400 TrustZone Controller Extends security to external DRAM Prevents illegal access to protected memory regions Protection from software attacks Part of TrustZone system Between CCI/NIC and DMC Applications: Secure Video Path for DRM, Trusted UI for secure payment TrustZone Cortex-A15 / Cortex-A12 ACE ACE GIC-400 Cortex-A7 ACE-Lite ACE-Lite PHY TrustZone ACE ACE Mali-T6xx Graphics Mali-V500 Video IP CCI-400 Cache Coherent Interconnect DMC-400 ACE-Lite ACE-Lite ACE-Lite CoreLink TZC-400 ACE-Lite ACE-Lite ACE-Lite PHY ACE-Lite ACE-Lite AXI3 Secure ROM LCD AXI3 AXI3 ACE-Lite NIC-400 NIC-400 Configurable: AXI3/AHB-Lite/APB Secure RAM Crypto Engine AXI3/AHB Address Map DRAM Secure DRAM DRAM Secure DRAM Master A Master B Master C Master D Write Read Write Read Write Read Region 0 Region 1 Region 2 Supports multiple interfaces (1,2 or 4) Secures 8 memory regions Enables a protected data pipe Setup read / write for specific masters Fast Path for low latency masters 256 outstanding transactions 16

Discretix Content Protection over TrustZone Discretix Hardware Assisted Content Protection for Android Devices Pre-integrated and ready on all major Android platforms Integrated and deployed over Trustonic t-base Key devices with Discretix below Offering all the common Content Protection schemes: PlayReady for OTT and video services HDCP 2.x for Miracast DTCP for DLNA CPRM for Japan Mobile TV LG Optimus G Samsung Galaxy Note 2 Sharp SH-10D HTC One Samsung Galaxy S3 Google Nexus 4 Huawei HW-01E HTC Butterfly Sony Xperia V Samsung Galaxy Note 10.1 Discretix Proprietary and Confidential 17

Ellipsys-SB & tboot DRM Framework HDCP 2 APIs DTCP-IP APIs HDCP 2 DTCP-IP PlayReady Other DRM Complete Security Solutions for TrustZone and TEE Rich OS Media Player Application Trusted Execution Environment Multi-DRM TEE Application Content Protection and DRM tvault HDCP 2.2 (Wi-Fi Display / Miracast) tvault DTCP-IP (DLNA enabled devices) tvault DRM (PlayReady) TEE Client API Rich OS Messages Security Protocol Accelerator (SPAcc) Security Protocol Processor (SPP) Embedded Security Module (ESM) HW Platform Ellipsys Crypto TEE Service API Secure OS NVM Secure Storage Platform Security Ellipsys-SB & Ellipsys-tBoot (Secure Boot) Ellipsys-CA (Certification Authority) Security protocol accelerators and processors Control interfaces support both secure and normal transactions Reliable protection for sensitive data and transactions High performance Low power consumption Efficient use of processing and bus resources Intelligent data movement and controls 18 2013 Elliptic Technologies Inc.

DRM Fusion - Content Protection from INSIDE Secure Fully integrated and supporting ARM TrustZone and TEEs PlayReady support for Android and Linux platforms Security enhanced with state-of-the-art hardware integration, obfuscation, anti-tampering and whitebox encryption Streaming support and file based content support including Smooth Streaming, HLS, MPEG-DASH and Ultraviolet HDCP and DTCP-IP solutions for local link content protection Studio approved technology with millions of users Available for Mobile Devices, STBs, Connected TVs and other devices 19 INVESTORS PRESENTATION SEPTEMBER 2012

<t-play Trusted Media Playback Platform from Trustonic

<t-play Trusted Media Playback Platform For Content Rights Holders Higher bar of security for premium content Open Architecture for greater content distribution opportunities For Service providers OTA access to Trusted Playback capabilities for premium services Payment and authentication integration for new business models and customer acquisition For OEMs Turnkey multi-drm solution for more content and time to market Committed to independent assurance - Most deployed and mature platform Lower BOM cost through downloadable DRM architecture

About Trustonic

Vision and Mission Vision Enriching, simplifying AND EXPANDING people s digital lives by SECURING valued services on smart devices. Our Mission To be the trusted foundation of choice for all smart connected devices. Empowering our partners to enrich and simplify consumers lives through our technology, OPEN business model and VIBRANT application ecosystem. 23

Timeline & Milestones Mobicore in Galaxy S3 / Note II Mobicore R+D Trusted Foundations TrustZone SW TrustZone API Trusted Foundations in Media Tablet Secure Services Division Standards TrustZone Project Carbon OMTP- TR0 OMTP- TR1 GP- TEE-API Earlier 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 24

Trustonic Partners SILICON IP TRUSTED SERVICE MGR MOVIES SERVICES CHIP MAKER APP DEVELOPERS PAYMENTS COMMERCE DEVICE MAKER ENTERPRISE 25

<t-play Trusted Media Playback Platform For Content Rights Holders Higher bar of security for premium content Open Architecture for greater content distribution opportunities For Service providers OTA access to Trusted Playback capabilities for premium services Payment and authentication integration for new business models and customer acquisition For OEMs Turnkey multi-drm solution for more content and time to market Committed to independent assurance - Most deployed and mature platform Lower BOM cost through downloadable DRM architecture

27 Simpler, faster, safer commerce

Your Device at Work Better User Experience and more functions Integrated into the device Remove need for complex passwords Certifiable for high assurance Expands to include biometrics 2-FA Token Security Function Trusted Handset 2 Factor Authentication Secure Storage Communication Security Corporate Policy Enforcement $20 Annual Price per User $TBD 28

Why Trustonic? Security software is meaningless without accessible TRUST Only Trustonic provides both key management services and secure software essential for TRUST Trusted Execution Environments are not trivial things to develop Trustonic has hundreds of man-years experience in developing commercial grade high assurance TEEs Trustonic has total ecosystem support for TEEs Trustonic supports the leading Chip Makers 29

Assured content acquisition Solutions deployed in more than 100m devices 30 Google Galaxy Nexus Google Nexus 7 Samsung Galaxy S III Samsung Galaxy Note II Samsung Galaxy Note 10.1 Motorola Razr HD

Thank You michael.lu@trustonic.com