Applied and Integrated Security. C. Eckert

Similar documents
APPLIED AND INTEGRATED SECURITY

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Embedded Java & Secure Element for high security in IoT systems

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Vehicular On-board Security: EVITA Project

MEng, BSc Applied Computer Science

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

Bellevue University Cybersecurity Programs & Courses

Cyber Security and Privacy

MEng, BSc Computer Science with Artificial Intelligence

WHITE PAPER Security in M2M Communication What is secure enough?

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

WIND RIVER SECURE ANDROID CAPABILITY

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

M2M The Next Industrial Revolution & Energy Transition Driver. M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo

PUF Physical Unclonable Functions

Automotive Software Development Challenges Virtualisation and Embedded Security

CHASE Survey on 6 Most Important Topics in Hardware Security

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Facilitated Self-Evaluation v1.0

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS

Software Engineering in Kaiserslautern,, Germany

What is Really Needed to Secure the Internet of Things?

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

future data and infrastructure

Fostering Incident Response and Digital Forensics Research

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

The Next Generation of Security Leaders

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Cisco Advanced Services for Network Security

ICT Enabling the Future of Smart Energy. Competence Center IT4Energy Dr. Thomas Luckenbach Dr. Armin Wolf

In the pursuit of becoming smart

A Systems Approach to HVAC Contractor Security

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Presentation Fraunhofer Research Center for Assistive Information and Communication Solutions. Applied Science by Fraunhofer Made in Portugal

Global Identity Management of Virtual Machines Based on Remote Secure Elements

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

Security in Vehicle Networks

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Index. BIOS rootkit, 119 Broad network access, 107

Cloud security architecture

Brainloop Cloud Security

Cryptography in Metrology

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013

Protecting Your Organisation from Targeted Cyber Intrusion

ATTPS Publication: Trustworthy ICT Taxonomy

Managing Enterprise Devices and Apps using System Center Configuration Manager

Secure Hardware PV018 Masaryk University Faculty of Informatics

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

The Internet of Things Risks and Challenges

InfoSec Academy Application & Secure Code Track

Security in ST : From Company to Products

Assessing Risks in the Cloud

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Industrial Control Systems Security Guide

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Reviving smart card analysis

Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices

Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

CRYPTOGRAPHY AS A SERVICE

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

The Internet of Things: Opportunities & Challenges

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Developing Secure Software in the Age of Advanced Persistent Threats

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

CyberSecurity Solutions. Delivering

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Defending the Internet of Things

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Transcription:

Applied and Integrated Security 1

Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass factory 2

Fraunhofer Profile in 2010 60 Institutes 80 research units at approx. 40 locations Europe, Asia, USA 17 000 employees 1.7 billion research budget 7 Alliances Information and Communication Technology Life Sciences Materials and Components Microelectronics Production Surface Technology and Photonics Defense and Security V-A2/ Febr 05 3

Fraunhofer Profile in 2010 Alliance: Information and Communication Technology 4

Fraunhofer Profile in 2010 Alliance: Information and Communication Technology MEVIS Medical Image Computing http://www.mevis.fraunhofer.de/ ISST Software and Systems Engineering http://www.isst.fraunhofer.de/ FIT Applied Information Technology http://www.fit.fraunhofer.de/ IAIS Intelligent Analysis and Information Systems http://www.iais.fraunhofer.de/ SCAI Algorithms and Scientific Computing http://www.scai.fraunhofer.de/ FKIE Communication, Information Processing and Ergonomics http://www.fkie.fraunhofer.de/ IGD Computer Graphics Research http://www.igd.fraunhofer.de/ 5

Fraunhofer Profile in 2010 Alliance: Information and Communication Technology SIT Secure Information Technology http://www.sit.fraunhofer.de/ IESE Experimental Software Engineering http://www.iese.fraunhofer.de/ ITWM Industrial Mathematics http://www.itwm.fraunhofer.de/ IOSB Optronics, System Technologies and Image Exploitation http://www.iosb.fraunhofer.de/ FIRST Computer Architecture and Software Technology http://www.first.fraunhofer.de/ FOKUS Open Communication Systems http://www.fokus.fraunhofer.de/ HHI Telecommunications, Heinrich-Hertz-Institut http://www.hhi.fraunhofer.de/ 6

Fraunhofer Profile in 2010 Alliance: Information and Communication Technology IDMT Digital Media Technology http://www.idmt.fraunhofer.de/ IIS Integrated Circuits http://www.iis.fraunhofer.de/ IAO Industrial Engineering http://www.iao.fraunhofer.de/ AISEC Applied and Integrated Security http://www.aisec.fraunhofer.de/ ESK Communication Systems http://www.esk.fraunhofer.de/ 7

Fraunhofer AISEC Mission Development of innovative Security Technologies to improve Robustness, Dependability and Security of IT-based Systems and Infrastructures Development of innovative, new Applications to improve existing (IT-based) Workflows and to enable new Business Models Development of Test Methods and Tools to improve the Quality of Products, Designs, Applications, to minimize Risks and reduce Damages Innovation through Security & Innovative Security 8

AISEC Key Figures Employees: 2011: 54 (FTEs) + > 20 research students 2012: > 65 (FTEs) 2014: > 80 (FTEs) Financing (Fraunhofer Model) Up to 30% state directly 70% 3 rd party research projects 9

AISEC Competences Embedded Security Smartcard & RFID Security Product Protection Cloud & Service Security Network Security Automotive Security IT Early Warning Smart Grid & Cyber Phys. Systems Security Evaluation 10

AISEC Research & Development Groups Embedded Security, Dr. F. Stumpf Secure Hardware Platforms Mobile Phones, Smartphones etc. Anti-Piracy, Know-how protection Network Security, P. Schoo Security in IP-based networks Automotive Security, Car2X Automated Malware-detection Secure Services & Quality Testing, M. Hoffmann Secure Cloud Computing Identity Management Testframeworks for SOA, Cloud 11

AISEC Security-Labs Hardware-Lab Side Channel & Fault attacks Smart Meter Lab Security Analysis, Hacking Mobile Payment Lab NFC-based solutions Network-Lab Malware Analysis Automotive Lab Cloud-Lab Cloud-Cockpit 12

Some of our Partners 13

Services and Offerings at a Glance Studies risk analyses, evaluation of technologies and concepts Tests vulnerability analyses, technical pre-auditing Development concepts, proofs-of-concepts, implementation, integration Modeling security concepts, optimization of infrastructures & solutions Training & Consulting seminars, coaching 14

Our Strengths Our labs provide ideal environment for evaluations. Security Analysis and Testing Interoperability Testing, conformance testing We have the right competences, environment and labs to design prototypes demonstrating tailored solutions, develop proof-of-concepts demonstrating improved solutions Our knowledge about all layers: Hardware, Embedded, Networking, Services, Cloud, Processes allows us to provide holistic security solutions. We participate in leading research projects (national and EU level) 15

Innovation for Security AISEC Research Labs 16

Embedded Security Secure Remote Keyless Entry (RKE) Problem: Access and electronic blocking can be broken easily Innovative Solution: Elliptic Curve Cryptography strong asymmetric cryptography New efficient protocol for RKE. Advantage: Tailored Security Solution Only public key stored in car: Easier key management and better security 17

Smart Card and RFID Fingerprint for Objects: Unclonable Material-Based Security Problem Secure Storage of Keys in Chips and other Components Binding of different Components Innovative Solution Chip und Card Body build a common Physical Unclonable Function (PUF) Advantage Physical Protection of Card and Body Invasive Attacks Destroy the Secrets

Piracy Protection Problem Cloning of High-Tech Components Innovative Solution Secure Element as Hardware Trust Anchor Authentication between Firmware und Hardware Software Obfuscation for Firmware Advantage Verification of Original HW and SW before System Start 19

Cloud & Service Security Cloud-Monitor Workflow Manager GRC Manager Problem Cloud User loose Control Innovative Solution Select Control Parameters Continuous Check with predefined values Advantage Individual configuration of Monitoring Services Data Flow Analysis Log-Check, Error Detection Application Application Server App Controller Java VM Virtuelle Maschine Event Bus Policy Manager Xen / KVM Hypervisor Operating Sytsem Modells DSL Interpreter Complex Event Processing Virtuelle Maschine Metrics Manager PLUGINS Examples MONITORING FRAMEWORK 20

Network Security Secure Cloud Networking Problem Where are my Data! Innovative Solution User Defined Policies Sicherheitslösungen für Automated Check of Security Relevant Parameters Advantage Cloud-User: Individually Adapted Policies and Proof of Compliance Cloud-Provider: Offer and Accounting of User Defined Services 21

Automotive Security Problem Local Storage of Cryptographic Keys in Standard Flash-Memories is not secure Innovative Soultion Central Key Management with Secure Element Secure Memory and Cryptographic Services Advantage Secure Authentication of Vehicles and Components Base for In-Car and external communication (C2X) 22

IT-Early Warning Problem Exchange of Information about Security Incidents across Domains Innovative Solution Anonymous Certificates P2P-Nets Secure Multiparty Protocols Advantage Immediate Information Exchange and Data Analysis across Domains Early Detection of Threats: In-Time and Focused Reaction 23

Smart Grid Smart Meter Problem Attacks on Control Systems Fraud Privacy Protection Innovative Solutions Security Concepts for Smart Meter and Gateways Adapted Hardware Security Modules and Efficient (Cryptographic) Protocols Concepts for Anonymity and Pseudonyms Advantage Development of Smart Grid Reference Architectures 24

Security-Evaluation Problem Security needs to be tested Real attack vectors have to be applied Solutions New attack tools Wide spectrum of test benches Tailored test labs: Hardware, Nets, Automotive, Grid, Cloud, Apps Advantage Holistic Analysis: HW/SW Test during development 25

AISEC Fields of Expertise SST NES EMS Embedded Security þ Smart Card & RFID þ þ Cloud & Service Computing þ þ þ Security Evaluation þ þ þ þ Product Protection þ Automotive Security þ þ Network Security þ þ IT Early Warning þ SmartGrid Security þ þ 26