Secure Firmware Update Lab Session
|
|
- Laurence Cook
- 5 years ago
- Views:
Transcription
1 Secure Firmware Update Lab Session Shotaro Saito, Staff Application Engineer, Secure MCU Class ID: BL02I Renesas Electronics America Inc.
2 Shotaro Saito, Application Engineer 24 years in Embedded Systems Development In-Circuit Emulator / Debugger Development Debugger GUI Design Biometrics Enabled Smartcard Development 4 Years with Renesas Electronics In Charge of Secure MCU Development Kit and Tools Board ID Solution Support 2
3 Renesas Technology & Solution Portfolio 3
4 8/16-bit 32-bit Microcontroller and Microprocessor Line-up DMIPS, Superscalar Automotive & Industrial, 65nm 600µA/MHz, 1.5µA standby 500 DMIPS, Low Power Automotive & Industrial, 90nm 600µA/MHz, 1.5µA standby 165 DMIPS, FPU, DSC Industrial, 90nm 242µA/MHz, 0.2µA standby 25 DMIPS, Low Power Industrial & Automotive, 150nm 190µA/MHz, 0.3µA standby 10 DMIPS, Capacitive Touch Wide Industrial Format & LCDs Automotive, 130nm 350µA/MHz, 1µA standby 1200 DMIPS, Performance Automotive, 40nm 500µA/MHz, 35µA deep standby 165 DMIPS, FPU, DSC Industrial, 40nm 242µA/MHz, 0.2µA standby Embedded Security, ASSP Industrial, 90nm 1mA/MHz, 100µA standby 44 DMIPS, True Low Power Industrial & Automotive, 130nm 144µA/MHz, 0.2µA standby 4
5 8/16-bit 32-bit Microcontroller and Microprocessor Line-up DMIPS, Superscalar Automotive & Industrial, 65nm 600µA/MHz, 1.5µA standby 500 DMIPS, Low Power Automotive & Industrial, 90nm 600µA/MHz, 1.5µA standby True Embedded Security and Integration 165 DMIPS, FPU, DSC 1200 DMIPS, Performance Automotive, 40nm 500µA/MHz, 35µA deep standby 165 DMIPS, FPU, DSC Industrial, 40nm 242µA/MHz, 0.2µA standby Industrial, 90nm 242µA/MHz, 0.2µA standby 25 DMIPS, Low Power Industrial & Automotive, 150nm 190µA/MHz, 0.3µA standby 10 DMIPS, Capacitive Touch Wide Industrial Format & LCDs Automotive, 130nm 350µA/MHz, 1µA standby Embedded Security, ASSP Industrial, 90nm 1mA/MHz, 100µA standby 44 DMIPS, True Low Power Industrial & Automotive, 130nm 144µA/MHz, 0.2µA standby 5
6 Enabling The Smart Society The Smart Society is explicitly exposed to adversaries who intend to gain profit by breaching its security: Challenge: In the smart society, the inter-connectivity takes the key role while anyone can take advantage of it including cyber criminals. Devices in the smart society need to be smart enough to deny rogue intrusion attempts. Solution: The Secure MCU solution prevents end-point devices in the smart society from being compromised with secure authentication scheme 6
7 Agenda Embedded security basics Knowing your opponents Attack vectors on embedded systems Security perimeter Board ID The best plug Lab session Preparing RX62N as target system Download sample firmware with remote security stack Penetration testing Q&A 7
8 Embedded Security Basics 8
9 Knowing Your Opponents (1) Competitors Reverse engineering, vulnerability research, etc. Let s see what they got this time that we can mimic Counterfeiters Cloning Oh, they make it hard this time but we can still crack it Hackers Pure curiosity (raison d être of them) I ll run my homebrewed app on PS3. EULA? What is it? Fame, promotion and job opportunity He s very popular as iphone and PlayStation3 jailbreaker (Geohot vs. Sony, 2010) I could hack your server. Why don t you hire me as your CSO? (Marriott Hotel, Nov. 2011) 9
10 Knowing Your Opponents (2) Opponents in the real world They do ANYTHING for making a profit This is fake Samsung Galaxy SIII BTW, this Apple store is FAKE! 10
11 Attack Vectors (1) Communication Interface JTAG Widely available on popular MCUs Serial (RS-232C) Console hacking starts from here Ethernet Remote hacking from the other side of the Earth USB Stuxnet, PS3 jailbreak utilize USB dongle/memory stick I2C, SPI, SMBus, etc. 11
12 Attack Vectors (2) Physical penetration Opening enclosure Trace cut/jumper Add/remove/replace devices (i.e. MOD chips) Compromising device Break/dissolve device packaging Reconnect blown fuse with micro probe 12
13 Security Perimeter 13
14 Security Perimeter (1) What we protect and what we don t We can prevent this But we cannot prevent this Defining End-Point as security perimeter The target should not be cloned (Hardware/Software) The target eco system should be protected 14
15 Security Perimeter (2) End-point security Remote intrusion Altered meter Unauthorized charging Sophisticated theft Unauthorized access Remote intrusion Remote intrusion Denial-of-service 15
16 Security Perimeter (3) Target system definition RX63N RDK Represents network enabled device Application Console application with update feature Protection profile The application (RX63N side) Not to be altered Not to be extracted Update scheme (Server side) Unauthorized system is properly rejected False attempt is rejected and logged Adding secure MCU to RX63N RDK makes it easy 16
17 Board ID Proven Security Enhancement Board ID Tiny secure microcontroller (4.2mm x 4.2mm) Embedded secure element Credentials are stored in tamper proof memory section Hardware protection against known attacks Cryptographic coprocessor Fast RSA transaction with modular multiplication coprocessor Turn-key Solution Pre-loaded firmware for authentication specific application Outsourcing security measures Firmware update mandates Board ID on RX63N RDK Counterfeit target without Board ID is rejected 17
18 Lab Session 18
19 Lab Session Material RX63N RDK 32bit microprocessor demo kit Board ID Module Authentication specific module Authentication server Provides firmware update service ONLY AFTER proper authentication is done The Goal Utilize the Board ID module to perform secure firmware download to the RX63N demo kit from the Authentication Server Lab Procedure Follow the lab procedure (takes approximately 40 minutes) 19
20 Questions? 20
21 Enabling The Smart Society in Review The Smart Society is explicitly exposed to adversaries who intend to gain profit by breaching its security: Challenge: In the smart society, the inter-connectivity takes the key role while anyone can take advantage of it including cyber criminals. Devices in the smart society need to be smart enough to deny rogue intrusion attempts. Solution: The Secure MCU solution prevents end-point devices in the smart society from being compromised with secure authentication scheme Do you agree that we accomplished the above statement? 21
22 Please Provide Your Feedback Please utilize the Guidebook application to leave feedback or Ask me for the paper feedback form for you to use 22
23 Renesas Electronics America Inc.
RL78 Project Configuration Tips
RL78 Project Configuration Tips Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive
More informationImplementing Bootloaders on Renesas MCUs
Implementing Bootloaders on Renesas MCUs Brandon Hussey, Applications Engineer Class ID: CL09I Renesas Electronics America Inc. Brandon Hussey Applications Engineer RX support Flash API Virtual EEPROM
More informationUsing Software Building Blocks for Faster Time to Market
Using Software Building Blocks for Faster Time to Market Brandon Hussey, Applications Engineer Class ID: 3L09B Renesas Electronics America Inc. Brandon Hussey Applications Engineer RX support Flash API
More informationAn Introduction to e 2 studio
An Introduction to e 2 studio Axel Wolf, Tools Marketing Manager Class ID: 3C15B Renesas Electronics America Inc. Axel Wolf Product Marketing for Development Tools REA Marketing Unit, MCU Products Based
More informationLow Power Design Michael Thomas, Applications Engineer
Low Power Design Michael Thomas, Applications Engineer Class ID: CL01B Renesas Electronics America Inc. Michael Thomas (Applications Engineer) 5 years at Renesas Electronics RX200 Technical Support RTOS,
More informationLow Power Design. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved.
Low Power Design Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive & Industrial,
More informationCapacitive Touch Based User Interfaces and Hardware-based Solutions
Capacitive Touch Based User Interfaces and Hardware-based Solutions Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit
More informationRL78 Ultra Low Power MCU Lab
RL78 Ultra Low Power MCU Lab Michael Clodfelter Sr. Staff Application Engineer Class ID: CL07I Renesas Electronics America Inc. Mike Clodfelter Sr. Staff Application Engineer for Renesas Electronics 16bit
More informationEmbedding Audio into your RX Application
Embedding Audio into your RX Application Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit 8/16-bit 1200 DMIPS, Superscalar
More informationIncorporating a Capacitive Touch Interface into Your Design
Incorporating a Capacitive Touch Interface into Your Design Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit
More informationRL78 Ultra Low Power MCU Lab
RL78 Ultra Low Power MCU Lab Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Renesas Technology & Solution Portfolio 3 Microcontroller and Microprocessor Line-up 2010 2012 32-bit
More informationCAN In A Day 2L01I. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved.
CAN In A Day 2L01I Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive & Industrial,
More informationLibUSB - Create a Solution Without the Class Struggle
LibUSB - Create a Solution Without the Class Struggle Carl Stenquist, Staff AE Class ID: 2L01I Renesas Electronics America Inc. Carl Stenquist Applications Engineer USB Development & support of RX USB
More informationSoftware Development with an Open Source RTOS
Software Development with an Open Source RTOS Fatih Peksenar - Sr. Manager, Application Engineering Class ID: 9L02I Renesas Electronics America Inc. Mr. Fatih Peksenar Manager, Applications Engineering
More informationID 321L: KPIT GNU compiler plug-ins for HEW / KPIT Eclipse IDE
ID 321L: KPIT GNU compiler plug-ins for HEW / KPIT Eclipse IDE Matt Newsome, Principal Engineer, Software Tools, Renesas Electronics Europe, UK Kaushik Phatak, Tech Lead, KPIT Cummins Infosystems, Pune,
More informationID 730L: Getting Started with Multimedia Programming on Linux on SH7724
ID 730L: Getting Started with Multimedia Programming on Linux on SH7724 Global Edge Ian Carvalho Architect 14 October 2010 Version 1.0 Mr. Ian Carvalho System Architect, Global Edge Software Ltd. Responsible
More informationEnhance Embedded Systems with Low Cost TFT Solutions
Enhance Embedded Systems with Low Cost TFT Solutions Dean Chang, Product Marketing Manager Class ID: 5C09B Renesas Electronics America Inc. Dean Chang Product Marketing Manager 32 bit MCU/MPUs (RX, SH,
More informationID 020C: Hardware-in-Loop: System Testing Without the System
ID 020C: Hardware-in-Loop: System Testing Without the System Applied Dynamics International Marcella Haghgooie Sr. Field Applications Engineer 13 October 2010 Version: 1.2 Marcella Haghgooie Sr. Field
More informationCC05B RX Project Configuration Tips
CC05B RX Project Configuration Tips John Breitenbach, Senior Engineering Manager Class ID: CC05B Renesas Electronics America Inc. John Breitenbach Senior Engineering Manager Manage apps engineering team
More informationID B34L: HMI Development with QNX'S Momentics Toolchain and Connected Automotive Reference QNX CAR
ID B34L: HMI Development with QNX'S Momentics Toolchain and Connected Automotive Reference QNX CAR Patrick Shelly FAE, North American Automotive QNX Software Systems Tuesday, 12 October 2010 Jon Jedlicka
More informationGetting Started with Renesas Development Tools
Getting Started with Renesas Development Tools Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit 8/16-bit 1200 DMIPS,
More informationRapid RX600 System Development Using the RPDL and PDG
ID 320L: Rapid RX600 System Development Using the RPDL and PDG Renesas Electronics America Inc. Brandon Hussey Applications Engineer 12 & 13 October 2010 Version: 1.0 Welcome to the Rapid Development for
More informationID 024C: Auto Code Generation: The Shortest Distance From Idea to Implementation
ID 024C: Auto Code Generation: The Shortest Distance From Idea to Implementation Christopher Myers Director of Software Development 12 October 2010 Version: 1.1 Christopher Myers cmyers@simuquest.com Director
More informationID 025C: An Introduction to the OSEK Operating System
ID 025C: An Introduction to the OSEK Operating System Version 1.0 1 James Dickie Product Manager for Embedded Software Real-time operating systems AUTOSAR software components Software logic analyzer Experience:
More informationA11L: 78K0R Low Power MCU
A11L: 78K0R Low Power MCU Hands-On Lab Renesas Electronics America Inc. Bob Proctor Staff Engineer 12 & 13 October 2010 Version 1.0 1 Bob Proctor Staff Applications Engineer in Durham, NC 3-years at Renesas
More informationEmbedded Wireless Technologies
Embedded Wireless Technologies Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 1200 DMIPS, Superscalar Automotive
More informationID 220L: Hands-on Embedded Ethernet Design with an Open Source TCP/IP Stack
ID 220L: Hands-on Embedded Ethernet Design with an Open Source TCP/IP Stack Renesas Electronics America Inc. Fatih Peksenar Senior Manager, Applications Engineering 12 October 2010 Version: 1.2 Embedded
More informationID 434L: Incorporating a Capacitive Touch Interface into Your Design
ID 434L: Incorporating a Capacitive Touch Interface into Your Design Renesas Electronics America Inc. Jim Page Senior Applications Engineer 12 & 13 October 2010 Version: 1.1 1 Jim Page Senior Applications
More informationSecurity in Automotive Applications
Security in Automotive Applications Fabrice Poulard, Technical Marketing Automotive Business Group Class ID: BC05I Renesas Electronics America Inc. Fabrice Poulard Manager, Automotive Business Group Renesas
More information422L: Introduction to the.net Micro Framework
422L: Introduction to the.net Micro Framework TrygTech Julie Trygstad Vice President and Principal Engineer 13 October 2010 Version: 1.1 Julie Trygstad VP of Engineering and Principal Engineer BSc Computer
More informationRenesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development
Renesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development New Family of Microcontrollers Combine Scalability and Power Efficiency with Extensive Peripheral Capabilities
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationOptimizing RX Performance
Optimizing RX Performance Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 1200 DMIPS, Superscalar Automotive & Industrial,
More informationTHE HSL SECURE KVM COMBINERS. Simultaneously interact with multiple computers on the same screen
THE HSL SECURE KVM COMBINERS Simultaneously interact with multiple computers on the same screen THE NEED 1 Demanding environments require real-time presentation of information from isolated computers on
More informationBASICS OF THE RENESAS SYNERGY PLATFORM
BASICS OF THE RENESAS SYNERGY PLATFORM TM Richard Oed 2017.12 02 CHAPTER 6 RENESAS SYNERGY KITS CONTENTS 6 RENESAS SYNERGY KITS 03 6.1 The Different Types of Hardware Kits 03 6.2 The SK-S7G2 Starter Kit
More informationSmart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability
Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,
More informationSTM8L and STM32 L1 series. Ultra-low-power platform
STM8L and STM32 L1 series Ultra-low-power platform 8-bit and 32-bit MCU families 2 Flash (bytes) 2 M 1 M 128 K 16 K 8-bit Core STM8S Mainstream STM8A F and STM8AL Automotive STM8L Ultra-low-power 32-bit
More informationSINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker
NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationIntroducing: New Low-Cost & Low Pin Count PIC Microcontrollers for the 8-, 16- & 32-bit Markets
Introducing: New Low-Cost & Low Pin Count PIC Microcontrollers for the 8-, 16- & 32-bit Markets PIC MCU and dspic DSC Family Portfolio 2 New Low Cost, Low Pin-Count 8-, 16-, 32-bit Offerings 3 What Are
More informationSECURING ENERGY COMPANY DESKTOPS from Cyber Threats with the Latest KVM Technology
SECURING ENERGY COMPANY DESKTOPS from Cyber Threats with the Latest KVM Technology The threat of debilitating cyber-attacks is at an alltime high. It seems as if cyber criminals are now more sophisticated,
More informationGUI Development Using emwin on the FDI Direct Drive LCD Platforms
GUI Development Using emwin on the FDI Direct Drive LCD Platforms Michael S. King, Software Engineer Future Designs, Inc. Class ID: 5C12I Renesas Electronics America Inc. Michael S. King Software Engineer
More informationWhat Ails Our Healthcare Systems?
SESSION ID: FLE-F04 What Ails Our Healthcare Systems? Minatee Mishra Sr. Group Leader Product Security, Philips HealthTech @minatee_mishra Jiggyasu Sharma Technical Specialist Product Security, Philips
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationT he key to building a presence in a new market
Renesas Synergy MCUs Build Foundation for Groundbreaking Integrated Hardware/ Software Platform New family of microcontrollers combines scalability, power efficiency with extensive peripheral capabilities
More informationQuick Start Guide SYG-S7G2-MDK. Copyright 2015, Future Designs, Inc., All Rights Reserved
SYG-S7G2-MDK Future Designs, Inc., All Rights Reserved 1.0 Introduction The Future Designs, Inc. ΣyG TM Family provides a complete and qualified Graphical User Interface (GUI) / Human Machine Interface
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationEnhanced Mobile Security using Multi-Factor Biometric Authentication
Enhanced Mobile Security using Multi-Factor Biometric Authentication An Le Chief Technical Officer, BluStor PMC, Inc. 2013 BluStor PMC, Inc. 1 Contents The Rise of Mobile Computing... 3 Multi-Factor Biometric
More informationID B30C: IP Video Surveillance Applications
ID B30C: IP Video Surveillance Applications Using the Renesas SH 7724 MPU Global Edge Ian Carvalho Architect Kiran Gaitonde Program Manager 12 October 2010 Version 1.0 1 Mr. Ian Carvalho System Architect,
More informationLive Demo: A New Hardware- Based Approach to Secure the Internet of Things
SESSION ID: CCS-W04 Live Demo: A New Hardware- Based Approach to Secure the Internet of Things Cesare Garlati Chief Security Strategist prpl Foundation @CesareGarlati Securing the Internet of (broken)
More informationSE420 Software Quality Assurance
SE420 Software Quality Assurance Encryption Backgrounder September 5, 2014 Sam Siewert Encryption - Substitution Re-map Alphabet, 1-to-1 and On-to (function) A B C D E F G H I J K L M N O P Q R S T U V
More informationW e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s
W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s Session I of III JD Nir, Security Analyst Why is this important? ISE Proprietary Agenda About ISE Web Applications
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More informationMeeting FFIEC Meeting Regulations for Online and Mobile Banking
Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and
More informationThe PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference
The PKI Lie Attacking Certificate Based Authentication Ofer Maor CTO, Hacktics OWASP & WASC AppSec 2007 Conference San Jose Nov 2007 Copyright 2007 - The OWASP Foundation Permission is granted to copy,
More informationUsing Embedded Tools for I2C, SPI, and USB Debugging for the Renesas RX63N RDK
Using Embedded Tools for I2C, SPI, and USB Debugging for the Renesas RX63N RDK Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Agenda Introduction to the Renesas RX63N RDK Introduction
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationPortable Instrumentation Applications w/ the RL78
Portable Instrumentation Applications w/ the RL78 Bill Pratt, VP of Engineering Nu Horizons Electronics Class ID: CL21B Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Bill Pratt:
More informationAutomotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division
Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How
More informationSecurity and Privacy in RFID Evolving Application Spaces for Edge Security
1 Security and Privacy in RFID Evolving Application Spaces for Edge Security Chris Hanebeck, VP Product Management & Marketing Revere Security First, Allow Me to Scare Everyone And It Gets Worse Lockheed
More informationUART Thou Mad? An Introduction to the UART Hardware Interface. Mickey Shkatov. Toby Kohlenberg
UART Thou Mad? An Introduction to the UART Hardware Interface Mickey Shkatov Toby Kohlenberg 1 Table of Contents Abstract... 2 Introduction to UART... 2 Essential Tools... 4 UART and Security... 5 Conclusion...
More informationSecuring IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager
Securing IoT devices with Hardware Secure Element Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager 2 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris
More informationSecurity Testing. - a requirement for a secure business. ISACA DAY in SOFIA. Gabriel Mihai Tanase, Director, Cyber Services KPMG in CEE
Gabriel Mihai Tanase, Director, Cyber Services KPMG in CEE Cyber Security Services Security Testing - a requirement for a secure business ISACA DAY in SOFIA Agenda No Agenda Some minimum theory More real
More informationEmbedded System Security. Professor Patrick McDaniel Charles Sestito Fall 2015
Embedded System Security Professor Patrick McDaniel Charles Sestito Fall 2015 Embedded System Microprocessor used as a component in a device and is designed for a specific control function within a device
More informationThe Data Breach: How to Stay Defensible Before, During & After the Incident
The Data Breach: How to Stay Defensible Before, During & After the Incident Alex Ricardo Beazley Insurance Breach Response Services Lynn Sessions Baker Hostetler Partner Michael Bazzell Computer Security
More information18-642: Security Vulnerabilities
18-642: Security Vulnerabilities 11/20/2017 Security Vulnerabilities Anti-Patterns for vulnerabilities Ignoring vulnerabilities until attacked Assuming vulnerabilities won t be exploited: Unsecure embedded
More informationSTM32 F4 Series Cortex M4 http://www.emcu.it/stm32f4xx/stm32f4xx.html www.emcu.it STM32 F4 Main common features Cortex -M4 (DSP + FPU) STM32F429/439 180 MHz 1 to 2-MB Flash 256-KB SRAM STM32F427/437 180
More informationSIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017
SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and
More informationmbed Hello World! Introduction to mbed
mbed Hello World 1 Agenda Introduction to mbed Lab 1: mbed registration and Hello World demo Lab 2: Other IO Lab 3: Interfacing with sensors Lab 4: Output devices, a TextLCD Lab 5: Rapid prototyping, Build
More informationID B33C: Developing Rich Graphical User Interfaces Optimized for Embedded Systems
ID B33C: Developing Rich Graphical User Interfaces Optimized for Embedded Systems Jason Clarke Co-Founder Crank Software Inc. 13 October 2010 Version: 1.0 In the market place today the myth about embedded
More informationCopyright ECSC Group plc 2017 ECSC - UNRESTRICTED
Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED ECSC - UNRESTRICTED Introduction A Web Application Firewall (WAF) is, in our experience, the most important layer of defence against a wide range of attacks
More informationSECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA
SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO
More informationSecure RISC-V. A FIPS140-2 Compliant Trust Module for Quad 64-bit RISC-V Core Complex
Secure RISC-V A FIPS140-2 Compliant Trust Module for Quad 64-bit RISC-V Core Complex Shumpei Kawasaki, Murthy Vedula, Software Hardware Consulting Group Kesami Hagiwara, Cong-Kha Pham, University of Electro-Communications
More informationID 411C: Capacitive Touch User Interfaces and Hardwarebased
ID 411C: Capacitive Touch User Interfaces and Hardwarebased Solutions Renesas Electronics America Inc. Nelson Quintana Senior Manager, Marketing 12 October 2010 Version 1.2 Hello and welcome to course
More informationBASICS OF THE RENESAS SYNERGY PLATFORM
BASICS OF THE RENESAS SYNERGY PLATFORM TM Richard Oed 2018.11 02 CHAPTER 7 STARTING THE RENESAS SYNERGY PROMOTION KIT PK-S5D9 FOR THE FIRST TIME CONTENTS 7 STARTING THE RENESAS SYNERGY PROMOTION KIT PK-S5D9
More information1.264 Lecture 26. Security protocols. Next class: Anderson chapter 4. Exercise due before class
1.264 Lecture 26 Security protocols Next class: Anderson chapter 4. Exercise due before class 1 Encryption Encryption is the process of: Transforming information (referred to as plaintext) Using an algorithm
More informationEthical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,
More informationProtecting the Client
Protecting the Client Clients of networked applications Smart cards DRM Steven M. Bellovin October 8, 2007 1 Network Clients Thus far, we ve focused on servers network apps and privilege programs Do clients
More informationNew STM32 F7 Series. World s 1 st to market, ARM Cortex -M7 based 32-bit MCU
New STM32 F7 Series World s 1 st to market, ARM Cortex -M7 based 32-bit MCU 7 Keys of STM32 F7 series 2 1 2 3 4 5 6 7 First. ST is first to sample a fully functional Cortex-M7 based 32-bit MCU : STM32
More informationFOR IOT PRODUCT DEVELOPMENT
FOR IOT PRODUCT DEVELOPMENT TRONSHOW IEEE2050-2018 STANDARD 2018/12/12 ATSUSHI HASEGAWA INDUSTRIAL SOLUTION BUSINESS UNIT RENESAS ELECTRONICS CORPORATION SOLUTION OFFERINGS FOR FOCUS DOMAINS To develop
More informationwhitepaper ClickShare Security
ClickShare Security www.barco.com/clickshare Introduction ClickShare was introduced in 2012. Four years later, in 2016, a new generation of ClickShare Enterprise products was presented to the market. New
More informationLecture 9 User Authentication
Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block
More informationDesign Tradeoffs in Industrial Ethernet Hardware Implementations
Design Tradeoffs in Industrial Ethernet Hardware Implementations Wil Florentino, Industrial Segment Marketing Class ID: 2C08I Renesas Electronics America Inc. Wil Florentino Renesas Industrial Automation
More informationMicrocontroller Technologies for Smart Society
Microcontroller Technologies for Smart Society Ritesh Tyagi, Sr. Director MCU Marketing Class ID: 1C02B Renesas Electronics America Inc. Mr. Ritesh Tyagi Sr. Director Microcontroller Product Marketing
More informationHow Breaches Really Happen
How Breaches Really Happen www.10dsecurity.com About Dedicated Information Security Firm Clients Nationwide, primarily in financial industry Services Penetration Testing Social Engineering Vulnerability
More informationHacking challenge: steal a car!
Hacking challenge: steal a car! Your "local partner in crime" Sławomir Jasek IT security expert since 2005, and still loves this job Agenda BLE vs security How to hack the car New tool Vulnerabilities
More informationSecurity Pitfalls. A review of recurring failures. Dr. Dominik Herrmann. Download slides at https://dhgo.to/pitfalls
Security Pitfalls A review of recurring failures Dr. Dominik Herrmann Download slides at https://dhgo.to/pitfalls Research on security, privacy, online tracking, forensics. Postdoc researcher University
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationBluetooth modules. Modules and turnkey solutions with embedded Bluetooth firmware and AT command
Bluetooth modules Modules and turnkey solutions with embedded Bluetooth firmware and AT command 2012 Blue Modules series 2 The SPBT2532 and SPBT2632 micro-sized Blue Modules offer the most advanced Bluetooth
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationProtect Your Organization from Cyber Attacks
Protect Your Organization from Cyber Attacks Leverage the advanced skills of our consultants to uncover vulnerabilities our competitors overlook. READY FOR MORE THAN A VA SCAN? Cyber Attacks by the Numbers
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationClick Yes To Official Intrusion Detection System (ids Software)
Click Yes To Official Intrusion Detection System (ids Software) The Network Intrusion Detection System (IDS) inside of the VIPRE Business the software/service having trouble, Take note of the Rule ID from
More informationSECURITY TESTING. Towards a safer web world
SECURITY TESTING Towards a safer web world AGENDA 1. 3 W S OF SECURITY TESTING 2. SECURITY TESTING CONCEPTS 3. SECURITY TESTING TYPES 4. TOP 10 SECURITY RISKS ate: 2013-14 Few Security Breaches September
More informationProtect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com
Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering
More informationBite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs. January 27, 2016
Bite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs January 27, 2016 1 Agenda About Me Silicon Labs Who are we? What do we do? Applications Engineering Functions Skills needed IoT
More informationRSA Fraud & Risk Intelligence Solutions
RSA Fraud & Risk Intelligence Solutions Separating Customers from Criminals May 2015 1 Mobile Social Identities IOT Alternative Authentication Market Disruptors Biometrics Cross Channel Intelligence Sharing
More information5/15/2009. Introduction
Part 1: Cyber-Graffiti You know, I don t know what I hate more, wearing your face, or wearing your body. Look, why don t we just give them back to each other and call it even, okay? Castor Troy (Nicolas
More information