Sierraware Overview. Simply Secure



Similar documents
Android Virtualization from Sierraware. Simply Secure

Full and Para Virtualization

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

COS 318: Operating Systems. Virtual Machine Monitors

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)

Hardware accelerated Virtualization in the ARM Cortex Processors

x86 ISA Modifications to support Virtual Machines

Virtualization. Pradipta De

Virtualization. Types of Interfaces

Virtualization. Dr. Yingwu Zhu

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG

Chapter 14 Virtual Machines

Virtual Machine Security

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Nested Virtualization

Leveraging Thin Hypervisors for Security on Embedded Systems

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

COS 318: Operating Systems

Chapter 5 Cloud Resource Virtualization

COS 318: Operating Systems. Virtual Machine Monitors

Windows Server Virtualization & The Windows Hypervisor

Development of Type-2 Hypervisor for MIPS64 Based Systems

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machines. COMP 3361: Operating Systems I Winter

The Xen of Virtualization

ARM TrustZone and KVM Coexistence with RTOS For Automotive

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Distributed Systems. Virtualization. Paul Krzyzanowski

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista

Cloud Computing CS

Red Hat Linux Internals

H MICRO CASE STUDY. Device API + IPC mechanism. Electrical and Functional characterization of HMicro s ECG patch

Virtualization Technology

Servervirualisierung mit Citrix XenServer

Virtualization. Michael Tsai 2015/06/08

Virtualization is set to become a key requirement

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com

An Implementation Of Multiprocessor Linux

2972 Linux Options and Best Practices for Scaleup Virtualization

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

High Performance or Cycle Accuracy?

Virtualization Technology. Zhiming Shen

Virtualization for Hard Real-Time Applications Partition where you can Virtualize where you have to

Virtual machines and operating systems

Multi-core Programming System Overview

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

The MIPS architecture and virtualization

Virtualization for Cloud Computing

Enabling Technologies for Distributed Computing

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Embedded Java & Secure Element for high security in IoT systems

System Virtual Machines

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

KVM in Embedded Requirements, Experiences, Open Challenges

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

A Choices Hypervisor on the ARM architecture

The Microsoft Windows Hypervisor High Level Architecture

The XenServer Product Family:

Virtualization benefits Introduction to XenSource How Xen is changing virtualization The Xen hypervisor architecture Xen paravirtualization

OS Virtualization Frank Hofmann

Operating Systems. Lecture 03. February 11, 2013

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself

ARM Virtualization: CPU & MMU Issues

Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured PC-based Control and Operation

Embedded Systems. 6. Real-Time Operating Systems

DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations

Next Generation Operating Systems

Example of Standard API

Virtualization and the U2 Databases

Hybrid Platform Application in Software Debug

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Enabling Technologies for Distributed and Cloud Computing

WIND RIVER SECURE ANDROID CAPABILITY

PROCESSOR VIRTUALIZATION ON EMBEDDED LINUX SYSTEMS

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

Xen and the Art of. Virtualization. Ian Pratt

VMware Server 2.0 Essentials. Virtualization Deployment and Management

KVM/ARM: Experiences Building the Linux ARM Hypervisor

Prototype of Light-weight Hypervisor for ARM Server Virtualization

Basics of Virtualisation

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

KVM Architecture Overview

KVM/ARM: The Design and Implementation of the Linux ARM Hypervisor

Compromise-as-a-Service

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Security Security by Separation

Intel Virtualization Technology (VT) in Converged Application Platforms

Enterprise-Class Virtualization with Open Source Technologies

Transcription:

Sierraware Overview Simply Secure

Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization, Hardware Virtualization for A15 DRM and Content Protection Toolkits: Hardware accelerated media streaming and DTCP toolkit Integration with Microsoft Playready Integrity Management Linux Kernel Integrity Management Application Rootkit Scanner Incremental Log Scanner

Partnership and Community Open Virtualization is licensed under LGPL We will help partners port our software to their SOC and port their stack to Open Virtualization Broad range of customers, applications and community members. Partnership will be mutually beneficial.

Partnership with SOC Vendors and OEMs How can we help SOC vendors? Could Open Virtualization lower cost and accelerate time-to-production for your ODMs? How can we help OEMs Protect OEMs from liabilities of lost keys and content Quick time to market. Already established and used in popular SOCs Easy to use low cost model. Multiple licensing models. A community driven Open source and commercial license. Easy migration path.

SierraTEE: TrustZone Environment Normal World OS Secure OS Media Playback with DRM Java Payment With Secure Input/Output Java VM Services Mgr Secure Trustlet Tasks Global Platform Client API Secure Driver Kernel Global Platform Internal API Crypto Display File System Kernel Dispatcher Crypto Engine Monitor/Real Time Scheduler ARM SOC Secure Memory Secure External bus Secure Peripherals: Flash, Keyboard, Display

Powerful, Purpose-built OS Flexible with Neon and VFP Fully shared mode Supports both Secure or Normal world Thwarts side channel attacks by protecting branch target buffers, TLBs, etc Supports several interrupt models FIQ & IRQ in dedicated secure cores FIQ only mode when sharing cores Interrupt routing from secure to non-secure world

Simple, Small, Easy-to-Use Image can fit in small on-chip ROM Flexible scheduler: preemptive, cooperative Supports asynchronous IPC Stack overflow detection and profiling support High performance architecture with zero copy device drivers, fast context switching and cache lock down

Multi-core Ready: AMP/SMP Normal World Secure World Normal World Secure World Open Virtualization ARM MP Core Core Core 0 1 Core 2 Core 3 Open Virtualization ARM MP Core Core Core 0 1 Core 2 Core 3 Dedicated Cores for Secure and Normal World Satisfies size and performance constrained designs Ideally suited for high performance applications like media playback, transcoding Secure and Non-secure Kernels Share Cores Provides maximum peak CPU bandwidth Both secure and non-secure kernels can utilize all available cores

TrustZone/GlobalPlatform Ready-to-use modules Open Virtualization API is available for both Bootloader and Linux Secure tasklets can perform key operations like decrypting OS images and upgrading firmware Multiple modes of operation support both TrustZone enabled and normal processors

SierraVisor Hypervisor for ARM Integrated with TrustZone and Android

SierraVisor Universal Hypervisor, with three different choices Hardware Assisted Virtualization A15 based SOCs TrustZone Monitor as VMM TrustZone supported Cortex-A9 and ARM11 based SOCs Para-virtualization A9 and ARM11 based SOCs

Virtualization for Cortex A9, ARM11 Cortex A9 and ARM11 are the most popular ARM cores that are found in todays SOCs No support for virtualization Only two levels of privilege TrustZone provides a third level. Almost all ARM Cores provide TrustZone support There are two distinct ways for virtualizing the CPU Hypercalls for sensitive instructions: Run both the Guest kernel and Guest User in ARM Virtual User Mode TrustZone Monitor as VMM: Allows Guest run unmodified in its native privileges

Hypercalls and Sensitive Instructions Virtual User Mode. Both User and Kernel run in Virtual User Mode. Hypervisor runs in System Mode. Guest1 Guest0... Guest(n) Tasklet Tasklet Tasklets Secure World Virtualization VMM Secure micro-kernel TrustZone Monitor Co-processor Access Instructions MRC/MCR/CDP/LDC/STC TrustZone SMC I/O Regions READs and WRITEs to I/O regions Operations on CSPR MRS, MSR, CPS, SRS, RFE, LDM, DPSPC Indirect CSPR LDRT, STRT Hypercalls are inserted at compilation time Very low overhead at run time. All the work of identifying the instructions to be re-written will be done at compilation time. Enables very flexible scheme as the system designer can choose the operations to be over ridden and differentiate based on the real use. Not all Virtualization solutions have to be the same

TrustZone Monitor as a VMM User Kernel Guest0 User Kernel Guest1... User Kernel Guest(n) Tasklet Tasklets Tasklet Tasklets Tasklet Secure World Secure World kernel kernel TrustZone Monitor and Virtualization VMM TrustZone provides a mirror world, where memory and other resources are completely isolated from the normal world TrustZone Monitor can be extended to act as a hypervisor. Guests can continue to work without modifications Kernel can continue to run in supervisor mode Guests OSes can run in their individual containers with low overhead.

Sierraware Security Suite Available on popular SOCs Integrated with Android

Application Product Suites and Android Integration Secure Boot Integrity Management DRM Media Playback Secure Input/Secure Display Secure I/O and Peripherals File System (NAND, NOR Flash) I2C SWP (Embedded SE) Timers

Security Starts from Boot Secure perimeter starts with the bootloader Users can continue to use their preferred bootloader Security established before activating the bootloader Keys, media and other assets are fully protected Power On BootROM Open Virtualization OS Establish Security Perimeter Secure BootTasklet Secure Services Normal World Non Secure Bootloader OS Like Linux/BSD

Integrity Management Secure Scanner Engines File System Scanner Android Resources Filesystem, VFS Live Process Scanner Page Table, TLB Interrupt Table Scanner Kernel Scanner KernelSystemCall, KernelSyscallTable, KernelProcRoot, KernelProcRootIops, KernelProcRootLookup Interrupt Table Kernel Memory map Offline FS Integrity Secure World Scan Success Boot Android Normal World

Integrity Management - Kernel Scanner Kernel can t be monitored with simple Checksum. Integrity Checks for Rootkits and Kernel Hacks: Monitor Syscall interrupt and interrupt handler. This will ensure that core syscalls are not tampered with. Code Segment validation of all syscalls. Ensure that there is no malicious code is injected inside the kernel. Scan filesystem inode table to detect root kits like adore-ng. There are some root kits that over ride the VFS layer than the syscall layer.

Digital Rights Management Open Virtualization enables DRM, secure payment, and secure WiFi Crypto and integrated with Linux OCF Secure keypad and display Protected key and content storage, authenticated flash

DRM Media Playback Normal World Secure World 2 Android 2 DRM Frameworke DRM Decrypt DRM Plugin (OMA, PlayReady) 3 4 Audio/Video Decording Input Source (Streaming/File) 1 5

Secure Input Demo Android Java App Secure World UI

Sierraware - Here to help Simply Secure

Professional Services Custom Services ARM Design Expertise Project Management Porting software to processors Integrating TEE and SierraVisor with applications Developing drivers, encoders or apps Extensive experience with ARM processors and kernel code Android, Linux, BSD, and VxWorks development Hardware & FPGA Phased approach from planning and development to testing & certification Carefully defined schedules and communication with customers to avoid surprises & delays

Technical Support Telephone and Email Support Online technical documentation Software updates for commercial products Previews of upcoming releases Ability to influence feature enhancements Commitment to Quality Service Level Agreement (SLA) details support response times and escalation levels

Request a Demo

Samsung Exynos 4412 Android OS Media Playback with DRM Java Payment With Secure Input/Output Secure OS Crypto Display FAT32 Kernel Crypto Engine Monitor/Real Time Scheduler ARM SOC Secure Memory Secure External bus Secure Peripherals: Flash, Keyboard, Display

Xilinx Zynq-7000 User User User Tasklet Tasklet Tasklets Kernel Kernel Kernel Secure World Guest0 Guest1 Guest(n) Kernel TrustZone Monitor and Virtualization VMM

Nvidia Tegra3 Android OS Media Playback with DRM Java Payment With Secure Input/Output WebTop Linux OS Secure OS Crypto Display Kernel Monitor/Real Time Scheduler Multi-format Codec Tegra3 Secure Memory Secure External bus Secure Peripherals: Flash, Keyboard, Display

Applications and Market Segments

SierraTEE Applications 1. Headless Gateway Secure transcoding prevents valuable content from being snooped 2. Residential Gateway Secure BSSID and other network provisioning Defend against hackers and intrusions

SierraTEE Applications 1. Mobile Phones Secure Payments DRM Content protection Isolate secure OS from normal world OS 2. IP Set-top-box, Media Players DRM, Content Protection

SierraVisor Applications Work load consolidation Enables heterogeneous computing utilizing several generations of ARM SOCs from various vendors Legacy SW and CPU Emulation: OEMs can continue to use software developed on legacy OSes without worrying about changes to underlying hardware Example: OS and app stack built for ARM11 can work seamlessly on a Cortex-A15; the Hypervisor will emulate ARM11 on top of Cortex-A15

SierraVisor Applications Multi-core enablement: Power Management: With VCPUs, OSes never have to worry about the number of CPUs; the hypervisor controls power efficiently and transparently Allow legacy RTOSes run on multi-core CPUs Creates flexible work sharing Live backups to improve reliability On a router, VOIP stack can run Guest 0+ OSGI/TR- 069 and other apps on Guest1; if any guests crash, they can be brought back instantaneously

Thank You! sales@sierraware.com, +1 408 337 6400