<t base Trusted Application Development



Similar documents
Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK,

Symbian phone Security

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

M-Shield mobile security technology

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Embedded Java & Secure Element for high security in IoT systems

Mobile Sicherheitein sicheres Ecosystem für die mobile Kommunikation

Android Virtualization from Sierraware. Simply Secure

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Secure your Privacy. jrsys, Inc. All rights reserved.

DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations

Sierraware Overview. Simply Secure

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

H MICRO CASE STUDY. Device API + IPC mechanism. Electrical and Functional characterization of HMicro s ECG patch

POPP Hub Gateway. Manual

Android pay. Frequently asked questions

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

m Commerce Working Group

An Example of a Derived Credentials Architecture

Security in ST : From Company to Products

EMV-TT. Now available on Android. White Paper by

Internet Of things. Petr Ulvr, Business Development Manager Intel Corp. CEE New Biz Virtual Team

Mobile App Containers: Product Or Feature?

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Microsoft Enterprise Mobility Suite

MobileIron and Samsung Value Proposition

Mobile Cloud Computing

Track One Building a connected home automation device with the Digi ConnectCore Wi-i.MX51 using LinuxLink

Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks

The Internet of Things: Opportunities & Challenges

Secure Cloud and Remote Service Connections for AllJoyn Applications

ARM mbed IoT Device Platform. November 3 rd, 2014

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Wireless networks that make sense Low-energy semiconductor solutions for wireless sensor networks

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Protect Your Mobile World

Secure Cloud and Remote Service Connections for AllJoyn Applications

Questions from The New SensorTag - IoT Made Easy Webinar

Pervasive Computing und. Informationssicherheit

Mobile and Embedded/IoT market Overview and Trends. June 2014

BlackBerry 10.3 Work and Personal Corporate

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Smart Systems: the key enabling technology for future IoT

Introduction to Silicon Labs. November 2015

Mobile Driver s License Solution

Penetration Testing for iphone Applications Part 1

CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

ARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM

Deriving a Trusted Mobile Identity from an Existing Credential

IoT Security Platform

Weak Spots in Enterprise Mobility Management Dennis Schröder

Windows Phone 8 Security deep dive

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

In the pursuit of becoming smart

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Lecture 2 PLATFORM SECURITY IN ANDROID OS

Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Computer Automation Techniques. Arthur Carroll

The Impact of IoT on Semiconductor Companies

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

Security Requirements in the Era of Mobile communication The case of the financial industry

BlackBerry 10.3 Work Space Only

Android on i.mx Applications Processors

Dell Wyse Cloud Connect

Threat Model for Software Reconfigurable Communications Systems

Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks

En Wireless Mobile Utility (Android) User s Manual. D610, D600, D7100, D5300, D5200, D3300, Df

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Best Practices for a BYOD World

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4

Networking Services Trusted at every level and every phase

Mobile Application Security

Final Year Project Interim Report

Technology.Transfer.Application.

Developing for MSI Android Devices

Key & Data Storage on Mobile Devices

Introduction to Trusted Execution Environments (TEE) IY5606

M-Shield Mobile Security Technology: making wireless secure

AllJoyn Android Environment Setup Guide

ZigBee Technology Overview

ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics

How To Use An Atmel Atmel Avr32848 Demo For Android (32Bit) With A Microcontroller (32B) And An Android Accessory (32D) On A Microcontroller (32Gb) On An Android Phone Or

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

Enhanced Project Management for Embedded C/C++ Programming using Software Components

CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu

Integrating Mobile into Your Cross- Platform Strategy with Qt

BLE113 DEVELOPMENT KIT

En Wireless Mobile Utility (Android) User s Manual. D750, D610, D600, D7200, D7100, D5500, D5300, D5200, D3300, Df

Creating a More Secure Device with Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc.

Take your Work along with Connected Mobility

Software Prerequisites Linux Ubuntu LTS. Estimated completion time: 15min. The goal of this hands-on is to:

RoverPal - A Mobile Payment Application

NXP s Solution to ecall Brussels, October 19 th, 2010

Enterprise Mobility S.E.A.L / Galaxy S III

The Trusted Execution Environment:

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Transcription:

<t base Trusted Application Development Prepared for: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen am 4.12.2014 in München Markus Katzenberger Project Manager Trustonic GmbH 1

Agenda Who we are The Trusted Execution Environment TEE <t-base OTA Ecosystem Typical Use Cases for TEE <t-base architecture and APIs <t-base devices 2

Trustonic EXECUTIVE TEAM Ben Cade CEO Olivier Leger EVP Sales & Marketing Chris Jones COO Stephan Spitz EVP Engineering Jon Geater CTO OVER 100 EMPLOYEES LOCATED BETWEEN Cambridge, London, Maidenhead, Bath Munich Helsinki Tokyo Seattle, Austin, San Francisco Sophia, Paris Seoul Taipei 3

Trustonic EXECUTIVE TEAM Seattle, Austin, San Francisco Ben Cade CEO Olivier Leger EVP Sales & Marketing 2 years of Trustonic (Dec 2012 Dec 2014) Munich Chris Jones COO Stephan Spitz EVP Engineering What an amazing 2 years it s been. Helsinki Jon Geater CTO Trustonic OVER 100 EMPLOYEES technology LOCATED can already BETWEEN be found in over 300 Million smart devices and our growing ecosystem of service providers Cambridge, London, Tokyo stands at over Maidenhead, 50 companies Bath spanning enterprise, content protection, commerce and identity management segments. So, thank you to our partners for helping to establish this common Seoul Sophia, foundation Paris of trust in devices Now 2015 promises to be a year full of opportunity for those looking to deliver Taipei trust enhanced experiences to the masses! 4

Why use a TEE? Key assets exposed Key assets protected LOGO COLOR VERSIONS SMART CONNECTED DEVICE Normal App Security Critical Assets LOGO TEE Enabled App API Call on Security critical Routine Secure Container Trusted App - Secured Critical Assets Isolated space for handling high value assets MAIN OPERATING SYSTEM TRUSTONIC TEE LOGO IN BLACK LOGO ON BLACK TRUSTZONE SYSTEM-ON-CHIP 5

Where does t-base fit? A/V OUTPUT LOGO IN BLACK SMART CONNECTED DEVICE TRUSTZONE SYSTEM-ON-CHIP APPLICATIONS LOGO ON PROCESSOR BLACK NFC BLUETOOTH WI-FI RADIO MASS STORAGE SECURE ELEMENT LOCATION SENSOR BASEBAND RADIO TOUCHSCREEN SENSOR BIOMETRIC SENSOR 6

The Ecosystem <t-directory <t-kph TAM SERVICE PROVIDERS <t-dev DEVICE MAKER LOGO COLOR VERSIONS APP DEVELOPERS <t-sdk LOGO <t-base CHIP MAKER APP STORE LOGO IN BLACK LOGO ON BLACK SILICON IP END USERS 7

8 Use Cases for t-base TEE

Content Protection Content Service DTCP/IP LOGO COLOR VERSIONS LOGO Link Protection MAIN OS LOGO IN BLACK SMART CONNECTED DEVICE TEE Enabled Content Service App DRM and Media Framework APIs TRUSTZONE SYSTEM-ON-CHIP LOGO ON BLACK Secure Container DRM Decryption TRUSTONIC TEE Secure Playback Secure Boot Device Authentication User Authentication DRM Protection Trusted time source Secure Playback Link Protection DTCP Downloadable Scheme Trustonic protects video path from studio to user 9

Payments LOGO COLOR VERSIONS SMART CONNECTED DEVICE LOGO TEE Enabled Wallet App Secure Container Signed Sealed User Input Data API Call to Authenticate User Login/Password or Biometric Secure Input MAIN OS TRUSTONIC TEE LOGO IN BLACK LOGO ON BLACK TRUSTZONE SYSTEM-ON-CHIP 10 Trustonic protects PINs and Passwords and access to Biometric sensors

Enterprise LOGO GO COLOR VERSIONS APPLICATION LEVEL 2 Factor User Authentication Identity Management Authorization and SSO Physical access control with HCE Secure messaging: Voice and Data Data loss prevention SYSTEM LEVEL Secured dual persona Secured MDM and MAM Biometric matching LOGO IN BLACK LOGO ON BLACK DEVICE LEVEL Secure boot and integrity checks Bulk storage encryption Biometric hardware interfaces 11

Automotive Mobile as car remote control BLUETOOTH LE NFC Identity Management PIN/Fingerprint Unlock Remote Lock/Unlock Car personalization Performance and comfort Insurance Interface Driver risk profiled discounts Location based payments Parking Fuel/recharging Road tolls Premium Traffic information Entertainment Movies Apps 12

Internet of Things ENERGY BROKERAGE ADVERTISER HOME GATEWAY APPLIANCE MAKER HOME INSURER CONNECTION REQUESTS AUTHORIZATIONS SMART DEVICE GATEWAY User controls who can access what data Authentication Authorization Energy suppliers bid for contracts Smart meter Appliances request service Insurers discount on occupancy User location Temperature SMART METER THERMO- STAT CONNECTED APPLIANCES 13

Healthcare Health card Identity/Authorization Secure access to records Sensors and monitoring Privacy protected activity logging Secure connection to medical equipment Secure Storage of medical data MEDICAL EQUIPMENT 14

Trusted Application Development 15

<t-base Architecture Normal-World Application Secure-World Container Trusted Application Connector TCI Trusted Application <t-base Client API Trusted Application API <t-base daemon kernel COM System Crypto Security <t-base driver MCI <t-base OS ARM TrustZone enabled SoC 16

Development Tools TA Development <t-sdk (header files, libs, sample code, scripts) ARM DS-5 for compiling and debugging GNU GCC for compiling Secure Driver Development <t-ddk (header files, libs, sample code, scripts) ARM DS-5 for compiling debugging via JTAG according to SoC Tools Normal-World Development Existing Android driver is open-source Normal-World OS tools should be used 17

<t-base Normal world Normal-World Application Trusted Application Connector Memory Session Device <t-base Client API Device Access Session Management Memory Mapping <t-base Client API <t-base daemon kernel <t-base driver 18

<t-base Secure World Trusted Application API COM a set of functions for inter-world communication System <t-base system information and functions Crypto <t-base crypto provider Security Secure object functions for binary data Secure-World Containers Trusted Application Trusted Application API Security Crypto System COM <t-base OS 19

20 <t-base-300 GlobalPlatform API

GlobalPlatform API In addition to the <t-base-2xx APIs, <t-base 300 introduced the key GP features that are already standardized TEE Client API for client applications TEE Internal API for TA Cryptography Trusted Storage Memory Management Equivalent functionality of what is already available to develop Trusted Applications on <t-base-2xx 21

TEE Client API TEEC_InitializeContext TEEC_FinalizeContext TEEC_OpenSession TEEC_CloseSession TEEC_InvokeCommand TEEC_AllocateSharedMemory TEEC_RegisterSharedMemory TEEC_ReleaseSharedMemory 22

TEE Internal API: TA Interface TA_CreateEntryPoint TA_DestroyEntryPoint TA_OpenSessionEntryPoint TA_CloseSessionEntryPoint TA_InvokeCommandEntryPoint Trusted Applications are multi-instance 23

TEE Internal API: Memory Mgmt. Functions TEE_CheckMemoryAccessRights TEE_SetInstanceData TEE_GetInstanceData TEE_Malloc TEE_Realloc TEE_Free TEE_MemMove TEE_MemCompare TEE_MemFill 24

TEE Internal API: Object Functions TEE_GetObjectInfo TEE_GetObjectBufferAttribute TEE_GetObjectValueAttribute TEE_CloseObject TEE_AllocateTransientObject TEE_FreeTransientObject TEE_ResetTransientObject TEE_PopulateTransientObject TEE_InitRefAttribute TEE_InitValueAttribute TEE_CopyObjectAttributes TEE_GenerateKey TEE_OpenPersistentObject TEE_CreatePersistentObject TEE_CloseAndDeletePersistentObject TEE_ReadObjectData TEE_WriteObjectData TEE_TruncateObjectData TEE_SeekObjectData 25

TEE Internal API: Cryptographic Functions TEE_AllocateOperation TEE_FreeOperation TEE_GetOperationInfo TEE_SetOperationKey TEE_DigestUpdate TEE_DigestDoFinal TEE_CipherInit TEE_CipherUpdate TEE_CipherDoFinal TEE_MACInit TEE_MACUpdate TEE_MACComputeFinal TEE_MACCompareFinal TEE_AsymmetricEncrypt TEE_AsymmetricDecrypt TEE_AsymmetricSignDigest TEE_AsymmetricVerifyDigest TEE_GenerateRandom Keys must be transient objects 26

<t-base devices Arndale development board http://www.arndaleboard.org Exynos 5250 SoC System or Service Provider TAs Driver development Commercial Devices Each device must be added to Trustonic test infrastructure TA can be bundled in your APK in the /res folder We will support demos and POCs We can advise on suitable devices CONFIDENTIAL