Secure Firmware Update Lab Session

Size: px
Start display at page:

Download "Secure Firmware Update Lab Session"

Transcription

1 Secure Firmware Update Lab Session Shotaro Saito, Staff Application Engineer, Secure MCU Class ID: BL02I Renesas Electronics America Inc.

2 Shotaro Saito, Application Engineer 24 years in Embedded Systems Development In-Circuit Emulator / Debugger Development Debugger GUI Design Biometrics Enabled Smartcard Development 4 Years with Renesas Electronics In Charge of Secure MCU Development Kit and Tools Board ID Solution Support 2

3 Renesas Technology & Solution Portfolio 3

4 8/16-bit 32-bit Microcontroller and Microprocessor Line-up DMIPS, Superscalar Automotive & Industrial, 65nm 600µA/MHz, 1.5µA standby 500 DMIPS, Low Power Automotive & Industrial, 90nm 600µA/MHz, 1.5µA standby 165 DMIPS, FPU, DSC Industrial, 90nm 242µA/MHz, 0.2µA standby 25 DMIPS, Low Power Industrial & Automotive, 150nm 190µA/MHz, 0.3µA standby 10 DMIPS, Capacitive Touch Wide Industrial Format & LCDs Automotive, 130nm 350µA/MHz, 1µA standby 1200 DMIPS, Performance Automotive, 40nm 500µA/MHz, 35µA deep standby 165 DMIPS, FPU, DSC Industrial, 40nm 242µA/MHz, 0.2µA standby Embedded Security, ASSP Industrial, 90nm 1mA/MHz, 100µA standby 44 DMIPS, True Low Power Industrial & Automotive, 130nm 144µA/MHz, 0.2µA standby 4

5 8/16-bit 32-bit Microcontroller and Microprocessor Line-up DMIPS, Superscalar Automotive & Industrial, 65nm 600µA/MHz, 1.5µA standby 500 DMIPS, Low Power Automotive & Industrial, 90nm 600µA/MHz, 1.5µA standby True Embedded Security and Integration 165 DMIPS, FPU, DSC 1200 DMIPS, Performance Automotive, 40nm 500µA/MHz, 35µA deep standby 165 DMIPS, FPU, DSC Industrial, 40nm 242µA/MHz, 0.2µA standby Industrial, 90nm 242µA/MHz, 0.2µA standby 25 DMIPS, Low Power Industrial & Automotive, 150nm 190µA/MHz, 0.3µA standby 10 DMIPS, Capacitive Touch Wide Industrial Format & LCDs Automotive, 130nm 350µA/MHz, 1µA standby Embedded Security, ASSP Industrial, 90nm 1mA/MHz, 100µA standby 44 DMIPS, True Low Power Industrial & Automotive, 130nm 144µA/MHz, 0.2µA standby 5

6 Enabling The Smart Society The Smart Society is explicitly exposed to adversaries who intend to gain profit by breaching its security: Challenge: In the smart society, the inter-connectivity takes the key role while anyone can take advantage of it including cyber criminals. Devices in the smart society need to be smart enough to deny rogue intrusion attempts. Solution: The Secure MCU solution prevents end-point devices in the smart society from being compromised with secure authentication scheme 6

7 Agenda Embedded security basics Knowing your opponents Attack vectors on embedded systems Security perimeter Board ID The best plug Lab session Preparing RX62N as target system Download sample firmware with remote security stack Penetration testing Q&A 7

8 Embedded Security Basics 8

9 Knowing Your Opponents (1) Competitors Reverse engineering, vulnerability research, etc. Let s see what they got this time that we can mimic Counterfeiters Cloning Oh, they make it hard this time but we can still crack it Hackers Pure curiosity (raison d être of them) I ll run my homebrewed app on PS3. EULA? What is it? Fame, promotion and job opportunity He s very popular as iphone and PlayStation3 jailbreaker (Geohot vs. Sony, 2010) I could hack your server. Why don t you hire me as your CSO? (Marriott Hotel, Nov. 2011) 9

10 Knowing Your Opponents (2) Opponents in the real world They do ANYTHING for making a profit This is fake Samsung Galaxy SIII BTW, this Apple store is FAKE! 10

11 Attack Vectors (1) Communication Interface JTAG Widely available on popular MCUs Serial (RS-232C) Console hacking starts from here Ethernet Remote hacking from the other side of the Earth USB Stuxnet, PS3 jailbreak utilize USB dongle/memory stick I2C, SPI, SMBus, etc. 11

12 Attack Vectors (2) Physical penetration Opening enclosure Trace cut/jumper Add/remove/replace devices (i.e. MOD chips) Compromising device Break/dissolve device packaging Reconnect blown fuse with micro probe 12

13 Security Perimeter 13

14 Security Perimeter (1) What we protect and what we don t We can prevent this But we cannot prevent this Defining End-Point as security perimeter The target should not be cloned (Hardware/Software) The target eco system should be protected 14

15 Security Perimeter (2) End-point security Remote intrusion Altered meter Unauthorized charging Sophisticated theft Unauthorized access Remote intrusion Remote intrusion Denial-of-service 15

16 Security Perimeter (3) Target system definition RX63N RDK Represents network enabled device Application Console application with update feature Protection profile The application (RX63N side) Not to be altered Not to be extracted Update scheme (Server side) Unauthorized system is properly rejected False attempt is rejected and logged Adding secure MCU to RX63N RDK makes it easy 16

17 Board ID Proven Security Enhancement Board ID Tiny secure microcontroller (4.2mm x 4.2mm) Embedded secure element Credentials are stored in tamper proof memory section Hardware protection against known attacks Cryptographic coprocessor Fast RSA transaction with modular multiplication coprocessor Turn-key Solution Pre-loaded firmware for authentication specific application Outsourcing security measures Firmware update mandates Board ID on RX63N RDK Counterfeit target without Board ID is rejected 17

18 Lab Session 18

19 Lab Session Material RX63N RDK 32bit microprocessor demo kit Board ID Module Authentication specific module Authentication server Provides firmware update service ONLY AFTER proper authentication is done The Goal Utilize the Board ID module to perform secure firmware download to the RX63N demo kit from the Authentication Server Lab Procedure Follow the lab procedure (takes approximately 40 minutes) 19

20 Questions? 20

21 Enabling The Smart Society in Review The Smart Society is explicitly exposed to adversaries who intend to gain profit by breaching its security: Challenge: In the smart society, the inter-connectivity takes the key role while anyone can take advantage of it including cyber criminals. Devices in the smart society need to be smart enough to deny rogue intrusion attempts. Solution: The Secure MCU solution prevents end-point devices in the smart society from being compromised with secure authentication scheme Do you agree that we accomplished the above statement? 21

22 Please Provide Your Feedback Please utilize the Guidebook application to leave feedback or Ask me for the paper feedback form for you to use 22

23 Renesas Electronics America Inc.

RL78 Project Configuration Tips

RL78 Project Configuration Tips RL78 Project Configuration Tips Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive

More information

Implementing Bootloaders on Renesas MCUs

Implementing Bootloaders on Renesas MCUs Implementing Bootloaders on Renesas MCUs Brandon Hussey, Applications Engineer Class ID: CL09I Renesas Electronics America Inc. Brandon Hussey Applications Engineer RX support Flash API Virtual EEPROM

More information

Using Software Building Blocks for Faster Time to Market

Using Software Building Blocks for Faster Time to Market Using Software Building Blocks for Faster Time to Market Brandon Hussey, Applications Engineer Class ID: 3L09B Renesas Electronics America Inc. Brandon Hussey Applications Engineer RX support Flash API

More information

An Introduction to e 2 studio

An Introduction to e 2 studio An Introduction to e 2 studio Axel Wolf, Tools Marketing Manager Class ID: 3C15B Renesas Electronics America Inc. Axel Wolf Product Marketing for Development Tools REA Marketing Unit, MCU Products Based

More information

Low Power Design Michael Thomas, Applications Engineer

Low Power Design Michael Thomas, Applications Engineer Low Power Design Michael Thomas, Applications Engineer Class ID: CL01B Renesas Electronics America Inc. Michael Thomas (Applications Engineer) 5 years at Renesas Electronics RX200 Technical Support RTOS,

More information

Low Power Design. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved.

Low Power Design. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved. Low Power Design Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive & Industrial,

More information

Capacitive Touch Based User Interfaces and Hardware-based Solutions

Capacitive Touch Based User Interfaces and Hardware-based Solutions Capacitive Touch Based User Interfaces and Hardware-based Solutions Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit

More information

RL78 Ultra Low Power MCU Lab

RL78 Ultra Low Power MCU Lab RL78 Ultra Low Power MCU Lab Michael Clodfelter Sr. Staff Application Engineer Class ID: CL07I Renesas Electronics America Inc. Mike Clodfelter Sr. Staff Application Engineer for Renesas Electronics 16bit

More information

Embedding Audio into your RX Application

Embedding Audio into your RX Application Embedding Audio into your RX Application Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit 8/16-bit 1200 DMIPS, Superscalar

More information

Incorporating a Capacitive Touch Interface into Your Design

Incorporating a Capacitive Touch Interface into Your Design Incorporating a Capacitive Touch Interface into Your Design Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit

More information

RL78 Ultra Low Power MCU Lab

RL78 Ultra Low Power MCU Lab RL78 Ultra Low Power MCU Lab Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Renesas Technology & Solution Portfolio 3 Microcontroller and Microprocessor Line-up 2010 2012 32-bit

More information

CAN In A Day 2L01I. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved.

CAN In A Day 2L01I. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved. CAN In A Day 2L01I Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive & Industrial,

More information

LibUSB - Create a Solution Without the Class Struggle

LibUSB - Create a Solution Without the Class Struggle LibUSB - Create a Solution Without the Class Struggle Carl Stenquist, Staff AE Class ID: 2L01I Renesas Electronics America Inc. Carl Stenquist Applications Engineer USB Development & support of RX USB

More information

Software Development with an Open Source RTOS

Software Development with an Open Source RTOS Software Development with an Open Source RTOS Fatih Peksenar - Sr. Manager, Application Engineering Class ID: 9L02I Renesas Electronics America Inc. Mr. Fatih Peksenar Manager, Applications Engineering

More information

ID 321L: KPIT GNU compiler plug-ins for HEW / KPIT Eclipse IDE

ID 321L: KPIT GNU compiler plug-ins for HEW / KPIT Eclipse IDE ID 321L: KPIT GNU compiler plug-ins for HEW / KPIT Eclipse IDE Matt Newsome, Principal Engineer, Software Tools, Renesas Electronics Europe, UK Kaushik Phatak, Tech Lead, KPIT Cummins Infosystems, Pune,

More information

ID 730L: Getting Started with Multimedia Programming on Linux on SH7724

ID 730L: Getting Started with Multimedia Programming on Linux on SH7724 ID 730L: Getting Started with Multimedia Programming on Linux on SH7724 Global Edge Ian Carvalho Architect 14 October 2010 Version 1.0 Mr. Ian Carvalho System Architect, Global Edge Software Ltd. Responsible

More information

Enhance Embedded Systems with Low Cost TFT Solutions

Enhance Embedded Systems with Low Cost TFT Solutions Enhance Embedded Systems with Low Cost TFT Solutions Dean Chang, Product Marketing Manager Class ID: 5C09B Renesas Electronics America Inc. Dean Chang Product Marketing Manager 32 bit MCU/MPUs (RX, SH,

More information

ID 020C: Hardware-in-Loop: System Testing Without the System

ID 020C: Hardware-in-Loop: System Testing Without the System ID 020C: Hardware-in-Loop: System Testing Without the System Applied Dynamics International Marcella Haghgooie Sr. Field Applications Engineer 13 October 2010 Version: 1.2 Marcella Haghgooie Sr. Field

More information

CC05B RX Project Configuration Tips

CC05B RX Project Configuration Tips CC05B RX Project Configuration Tips John Breitenbach, Senior Engineering Manager Class ID: CC05B Renesas Electronics America Inc. John Breitenbach Senior Engineering Manager Manage apps engineering team

More information

ID B34L: HMI Development with QNX'S Momentics Toolchain and Connected Automotive Reference QNX CAR

ID B34L: HMI Development with QNX'S Momentics Toolchain and Connected Automotive Reference QNX CAR ID B34L: HMI Development with QNX'S Momentics Toolchain and Connected Automotive Reference QNX CAR Patrick Shelly FAE, North American Automotive QNX Software Systems Tuesday, 12 October 2010 Jon Jedlicka

More information

Getting Started with Renesas Development Tools

Getting Started with Renesas Development Tools Getting Started with Renesas Development Tools Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit 8/16-bit 1200 DMIPS,

More information

Rapid RX600 System Development Using the RPDL and PDG

Rapid RX600 System Development Using the RPDL and PDG ID 320L: Rapid RX600 System Development Using the RPDL and PDG Renesas Electronics America Inc. Brandon Hussey Applications Engineer 12 & 13 October 2010 Version: 1.0 Welcome to the Rapid Development for

More information

ID 024C: Auto Code Generation: The Shortest Distance From Idea to Implementation

ID 024C: Auto Code Generation: The Shortest Distance From Idea to Implementation ID 024C: Auto Code Generation: The Shortest Distance From Idea to Implementation Christopher Myers Director of Software Development 12 October 2010 Version: 1.1 Christopher Myers cmyers@simuquest.com Director

More information

ID 025C: An Introduction to the OSEK Operating System

ID 025C: An Introduction to the OSEK Operating System ID 025C: An Introduction to the OSEK Operating System Version 1.0 1 James Dickie Product Manager for Embedded Software Real-time operating systems AUTOSAR software components Software logic analyzer Experience:

More information

A11L: 78K0R Low Power MCU

A11L: 78K0R Low Power MCU A11L: 78K0R Low Power MCU Hands-On Lab Renesas Electronics America Inc. Bob Proctor Staff Engineer 12 & 13 October 2010 Version 1.0 1 Bob Proctor Staff Applications Engineer in Durham, NC 3-years at Renesas

More information

Embedded Wireless Technologies

Embedded Wireless Technologies Embedded Wireless Technologies Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 1200 DMIPS, Superscalar Automotive

More information

ID 220L: Hands-on Embedded Ethernet Design with an Open Source TCP/IP Stack

ID 220L: Hands-on Embedded Ethernet Design with an Open Source TCP/IP Stack ID 220L: Hands-on Embedded Ethernet Design with an Open Source TCP/IP Stack Renesas Electronics America Inc. Fatih Peksenar Senior Manager, Applications Engineering 12 October 2010 Version: 1.2 Embedded

More information

ID 434L: Incorporating a Capacitive Touch Interface into Your Design

ID 434L: Incorporating a Capacitive Touch Interface into Your Design ID 434L: Incorporating a Capacitive Touch Interface into Your Design Renesas Electronics America Inc. Jim Page Senior Applications Engineer 12 & 13 October 2010 Version: 1.1 1 Jim Page Senior Applications

More information

Security in Automotive Applications

Security in Automotive Applications Security in Automotive Applications Fabrice Poulard, Technical Marketing Automotive Business Group Class ID: BC05I Renesas Electronics America Inc. Fabrice Poulard Manager, Automotive Business Group Renesas

More information

422L: Introduction to the.net Micro Framework

422L: Introduction to the.net Micro Framework 422L: Introduction to the.net Micro Framework TrygTech Julie Trygstad Vice President and Principal Engineer 13 October 2010 Version: 1.1 Julie Trygstad VP of Engineering and Principal Engineer BSc Computer

More information

Renesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development

Renesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development Renesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development New Family of Microcontrollers Combine Scalability and Power Efficiency with Extensive Peripheral Capabilities

More information

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and

More information

Optimizing RX Performance

Optimizing RX Performance Optimizing RX Performance Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 1200 DMIPS, Superscalar Automotive & Industrial,

More information

THE HSL SECURE KVM COMBINERS. Simultaneously interact with multiple computers on the same screen

THE HSL SECURE KVM COMBINERS. Simultaneously interact with multiple computers on the same screen THE HSL SECURE KVM COMBINERS Simultaneously interact with multiple computers on the same screen THE NEED 1 Demanding environments require real-time presentation of information from isolated computers on

More information

BASICS OF THE RENESAS SYNERGY PLATFORM

BASICS OF THE RENESAS SYNERGY PLATFORM BASICS OF THE RENESAS SYNERGY PLATFORM TM Richard Oed 2017.12 02 CHAPTER 6 RENESAS SYNERGY KITS CONTENTS 6 RENESAS SYNERGY KITS 03 6.1 The Different Types of Hardware Kits 03 6.2 The SK-S7G2 Starter Kit

More information

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,

More information

STM8L and STM32 L1 series. Ultra-low-power platform

STM8L and STM32 L1 series. Ultra-low-power platform STM8L and STM32 L1 series Ultra-low-power platform 8-bit and 32-bit MCU families 2 Flash (bytes) 2 M 1 M 128 K 16 K 8-bit Core STM8S Mainstream STM8A F and STM8AL Automotive STM8L Ultra-low-power 32-bit

More information

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Introducing: New Low-Cost & Low Pin Count PIC Microcontrollers for the 8-, 16- & 32-bit Markets

Introducing: New Low-Cost & Low Pin Count PIC Microcontrollers for the 8-, 16- & 32-bit Markets Introducing: New Low-Cost & Low Pin Count PIC Microcontrollers for the 8-, 16- & 32-bit Markets PIC MCU and dspic DSC Family Portfolio 2 New Low Cost, Low Pin-Count 8-, 16-, 32-bit Offerings 3 What Are

More information

SECURING ENERGY COMPANY DESKTOPS from Cyber Threats with the Latest KVM Technology

SECURING ENERGY COMPANY DESKTOPS from Cyber Threats with the Latest KVM Technology SECURING ENERGY COMPANY DESKTOPS from Cyber Threats with the Latest KVM Technology The threat of debilitating cyber-attacks is at an alltime high. It seems as if cyber criminals are now more sophisticated,

More information

GUI Development Using emwin on the FDI Direct Drive LCD Platforms

GUI Development Using emwin on the FDI Direct Drive LCD Platforms GUI Development Using emwin on the FDI Direct Drive LCD Platforms Michael S. King, Software Engineer Future Designs, Inc. Class ID: 5C12I Renesas Electronics America Inc. Michael S. King Software Engineer

More information

What Ails Our Healthcare Systems?

What Ails Our Healthcare Systems? SESSION ID: FLE-F04 What Ails Our Healthcare Systems? Minatee Mishra Sr. Group Leader Product Security, Philips HealthTech @minatee_mishra Jiggyasu Sharma Technical Specialist Product Security, Philips

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

T he key to building a presence in a new market

T he key to building a presence in a new market Renesas Synergy MCUs Build Foundation for Groundbreaking Integrated Hardware/ Software Platform New family of microcontrollers combines scalability, power efficiency with extensive peripheral capabilities

More information

Quick Start Guide SYG-S7G2-MDK. Copyright 2015, Future Designs, Inc., All Rights Reserved

Quick Start Guide SYG-S7G2-MDK. Copyright 2015, Future Designs, Inc., All Rights Reserved SYG-S7G2-MDK Future Designs, Inc., All Rights Reserved 1.0 Introduction The Future Designs, Inc. ΣyG TM Family provides a complete and qualified Graphical User Interface (GUI) / Human Machine Interface

More information

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government

More information

Enhanced Mobile Security using Multi-Factor Biometric Authentication

Enhanced Mobile Security using Multi-Factor Biometric Authentication Enhanced Mobile Security using Multi-Factor Biometric Authentication An Le Chief Technical Officer, BluStor PMC, Inc. 2013 BluStor PMC, Inc. 1 Contents The Rise of Mobile Computing... 3 Multi-Factor Biometric

More information

ID B30C: IP Video Surveillance Applications

ID B30C: IP Video Surveillance Applications ID B30C: IP Video Surveillance Applications Using the Renesas SH 7724 MPU Global Edge Ian Carvalho Architect Kiran Gaitonde Program Manager 12 October 2010 Version 1.0 1 Mr. Ian Carvalho System Architect,

More information

Live Demo: A New Hardware- Based Approach to Secure the Internet of Things

Live Demo: A New Hardware- Based Approach to Secure the Internet of Things SESSION ID: CCS-W04 Live Demo: A New Hardware- Based Approach to Secure the Internet of Things Cesare Garlati Chief Security Strategist prpl Foundation @CesareGarlati Securing the Internet of (broken)

More information

SE420 Software Quality Assurance

SE420 Software Quality Assurance SE420 Software Quality Assurance Encryption Backgrounder September 5, 2014 Sam Siewert Encryption - Substitution Re-map Alphabet, 1-to-1 and On-to (function) A B C D E F G H I J K L M N O P Q R S T U V

More information

W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s

W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s W e b A p p l i c a t i o n S e c u r i t y : T h e D e v i l i s i n t h e D e t a i l s Session I of III JD Nir, Security Analyst Why is this important? ISE Proprietary Agenda About ISE Web Applications

More information

DesignWare IP for IoT SoC Designs

DesignWare IP for IoT SoC Designs DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

The PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference

The PKI Lie. The OWASP Foundation  Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference The PKI Lie Attacking Certificate Based Authentication Ofer Maor CTO, Hacktics OWASP & WASC AppSec 2007 Conference San Jose Nov 2007 Copyright 2007 - The OWASP Foundation Permission is granted to copy,

More information

Using Embedded Tools for I2C, SPI, and USB Debugging for the Renesas RX63N RDK

Using Embedded Tools for I2C, SPI, and USB Debugging for the Renesas RX63N RDK Using Embedded Tools for I2C, SPI, and USB Debugging for the Renesas RX63N RDK Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Agenda Introduction to the Renesas RX63N RDK Introduction

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Portable Instrumentation Applications w/ the RL78

Portable Instrumentation Applications w/ the RL78 Portable Instrumentation Applications w/ the RL78 Bill Pratt, VP of Engineering Nu Horizons Electronics Class ID: CL21B Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Bill Pratt:

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

Security and Privacy in RFID Evolving Application Spaces for Edge Security

Security and Privacy in RFID Evolving Application Spaces for Edge Security 1 Security and Privacy in RFID Evolving Application Spaces for Edge Security Chris Hanebeck, VP Product Management & Marketing Revere Security First, Allow Me to Scare Everyone And It Gets Worse Lockheed

More information

UART Thou Mad? An Introduction to the UART Hardware Interface. Mickey Shkatov. Toby Kohlenberg

UART Thou Mad? An Introduction to the UART Hardware Interface. Mickey Shkatov. Toby Kohlenberg UART Thou Mad? An Introduction to the UART Hardware Interface Mickey Shkatov Toby Kohlenberg 1 Table of Contents Abstract... 2 Introduction to UART... 2 Essential Tools... 4 UART and Security... 5 Conclusion...

More information

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager Securing IoT devices with Hardware Secure Element Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager 2 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris

More information

Security Testing. - a requirement for a secure business. ISACA DAY in SOFIA. Gabriel Mihai Tanase, Director, Cyber Services KPMG in CEE

Security Testing. - a requirement for a secure business. ISACA DAY in SOFIA. Gabriel Mihai Tanase, Director, Cyber Services KPMG in CEE Gabriel Mihai Tanase, Director, Cyber Services KPMG in CEE Cyber Security Services Security Testing - a requirement for a secure business ISACA DAY in SOFIA Agenda No Agenda Some minimum theory More real

More information

Embedded System Security. Professor Patrick McDaniel Charles Sestito Fall 2015

Embedded System Security. Professor Patrick McDaniel Charles Sestito Fall 2015 Embedded System Security Professor Patrick McDaniel Charles Sestito Fall 2015 Embedded System Microprocessor used as a component in a device and is designed for a specific control function within a device

More information

The Data Breach: How to Stay Defensible Before, During & After the Incident

The Data Breach: How to Stay Defensible Before, During & After the Incident The Data Breach: How to Stay Defensible Before, During & After the Incident Alex Ricardo Beazley Insurance Breach Response Services Lynn Sessions Baker Hostetler Partner Michael Bazzell Computer Security

More information

18-642: Security Vulnerabilities

18-642: Security Vulnerabilities 18-642: Security Vulnerabilities 11/20/2017 Security Vulnerabilities Anti-Patterns for vulnerabilities Ignoring vulnerabilities until attacked Assuming vulnerabilities won t be exploited: Unsecure embedded

More information

STM32 F4 Series Cortex M4 http://www.emcu.it/stm32f4xx/stm32f4xx.html www.emcu.it STM32 F4 Main common features Cortex -M4 (DSP + FPU) STM32F429/439 180 MHz 1 to 2-MB Flash 256-KB SRAM STM32F427/437 180

More information

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and

More information

mbed Hello World! Introduction to mbed

mbed Hello World! Introduction to mbed mbed Hello World 1 Agenda Introduction to mbed Lab 1: mbed registration and Hello World demo Lab 2: Other IO Lab 3: Interfacing with sensors Lab 4: Output devices, a TextLCD Lab 5: Rapid prototyping, Build

More information

ID B33C: Developing Rich Graphical User Interfaces Optimized for Embedded Systems

ID B33C: Developing Rich Graphical User Interfaces Optimized for Embedded Systems ID B33C: Developing Rich Graphical User Interfaces Optimized for Embedded Systems Jason Clarke Co-Founder Crank Software Inc. 13 October 2010 Version: 1.0 In the market place today the myth about embedded

More information

Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED

Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED ECSC - UNRESTRICTED Introduction A Web Application Firewall (WAF) is, in our experience, the most important layer of defence against a wide range of attacks

More information

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO

More information

Secure RISC-V. A FIPS140-2 Compliant Trust Module for Quad 64-bit RISC-V Core Complex

Secure RISC-V. A FIPS140-2 Compliant Trust Module for Quad 64-bit RISC-V Core Complex Secure RISC-V A FIPS140-2 Compliant Trust Module for Quad 64-bit RISC-V Core Complex Shumpei Kawasaki, Murthy Vedula, Software Hardware Consulting Group Kesami Hagiwara, Cong-Kha Pham, University of Electro-Communications

More information

ID 411C: Capacitive Touch User Interfaces and Hardwarebased

ID 411C: Capacitive Touch User Interfaces and Hardwarebased ID 411C: Capacitive Touch User Interfaces and Hardwarebased Solutions Renesas Electronics America Inc. Nelson Quintana Senior Manager, Marketing 12 October 2010 Version 1.2 Hello and welcome to course

More information

BASICS OF THE RENESAS SYNERGY PLATFORM

BASICS OF THE RENESAS SYNERGY PLATFORM BASICS OF THE RENESAS SYNERGY PLATFORM TM Richard Oed 2018.11 02 CHAPTER 7 STARTING THE RENESAS SYNERGY PROMOTION KIT PK-S5D9 FOR THE FIRST TIME CONTENTS 7 STARTING THE RENESAS SYNERGY PROMOTION KIT PK-S5D9

More information

1.264 Lecture 26. Security protocols. Next class: Anderson chapter 4. Exercise due before class

1.264 Lecture 26. Security protocols. Next class: Anderson chapter 4. Exercise due before class 1.264 Lecture 26 Security protocols Next class: Anderson chapter 4. Exercise due before class 1 Encryption Encryption is the process of: Transforming information (referred to as plaintext) Using an algorithm

More information

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,

More information

Protecting the Client

Protecting the Client Protecting the Client Clients of networked applications Smart cards DRM Steven M. Bellovin October 8, 2007 1 Network Clients Thus far, we ve focused on servers network apps and privilege programs Do clients

More information

New STM32 F7 Series. World s 1 st to market, ARM Cortex -M7 based 32-bit MCU

New STM32 F7 Series. World s 1 st to market, ARM Cortex -M7 based 32-bit MCU New STM32 F7 Series World s 1 st to market, ARM Cortex -M7 based 32-bit MCU 7 Keys of STM32 F7 series 2 1 2 3 4 5 6 7 First. ST is first to sample a fully functional Cortex-M7 based 32-bit MCU : STM32

More information

FOR IOT PRODUCT DEVELOPMENT

FOR IOT PRODUCT DEVELOPMENT FOR IOT PRODUCT DEVELOPMENT TRONSHOW IEEE2050-2018 STANDARD 2018/12/12 ATSUSHI HASEGAWA INDUSTRIAL SOLUTION BUSINESS UNIT RENESAS ELECTRONICS CORPORATION SOLUTION OFFERINGS FOR FOCUS DOMAINS To develop

More information

whitepaper ClickShare Security

whitepaper ClickShare Security ClickShare Security www.barco.com/clickshare Introduction ClickShare was introduced in 2012. Four years later, in 2016, a new generation of ClickShare Enterprise products was presented to the market. New

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

Design Tradeoffs in Industrial Ethernet Hardware Implementations

Design Tradeoffs in Industrial Ethernet Hardware Implementations Design Tradeoffs in Industrial Ethernet Hardware Implementations Wil Florentino, Industrial Segment Marketing Class ID: 2C08I Renesas Electronics America Inc. Wil Florentino Renesas Industrial Automation

More information

Microcontroller Technologies for Smart Society

Microcontroller Technologies for Smart Society Microcontroller Technologies for Smart Society Ritesh Tyagi, Sr. Director MCU Marketing Class ID: 1C02B Renesas Electronics America Inc. Mr. Ritesh Tyagi Sr. Director Microcontroller Product Marketing

More information

How Breaches Really Happen

How Breaches Really Happen How Breaches Really Happen www.10dsecurity.com About Dedicated Information Security Firm Clients Nationwide, primarily in financial industry Services Penetration Testing Social Engineering Vulnerability

More information

Hacking challenge: steal a car!

Hacking challenge: steal a car! Hacking challenge: steal a car! Your "local partner in crime" Sławomir Jasek IT security expert since 2005, and still loves this job Agenda BLE vs security How to hack the car New tool Vulnerabilities

More information

Security Pitfalls. A review of recurring failures. Dr. Dominik Herrmann. Download slides at https://dhgo.to/pitfalls

Security Pitfalls. A review of recurring failures. Dr. Dominik Herrmann. Download slides at https://dhgo.to/pitfalls Security Pitfalls A review of recurring failures Dr. Dominik Herrmann Download slides at https://dhgo.to/pitfalls Research on security, privacy, online tracking, forensics. Postdoc researcher University

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Bluetooth modules. Modules and turnkey solutions with embedded Bluetooth firmware and AT command

Bluetooth modules. Modules and turnkey solutions with embedded Bluetooth firmware and AT command Bluetooth modules Modules and turnkey solutions with embedded Bluetooth firmware and AT command 2012 Blue Modules series 2 The SPBT2532 and SPBT2632 micro-sized Blue Modules offer the most advanced Bluetooth

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Protect Your Organization from Cyber Attacks

Protect Your Organization from Cyber Attacks Protect Your Organization from Cyber Attacks Leverage the advanced skills of our consultants to uncover vulnerabilities our competitors overlook. READY FOR MORE THAN A VA SCAN? Cyber Attacks by the Numbers

More information

Atmel Trusted Platform Module June, 2014

Atmel Trusted Platform Module June, 2014 Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

Click Yes To Official Intrusion Detection System (ids Software)

Click Yes To Official Intrusion Detection System (ids Software) Click Yes To Official Intrusion Detection System (ids Software) The Network Intrusion Detection System (IDS) inside of the VIPRE Business the software/service having trouble, Take note of the Rule ID from

More information

SECURITY TESTING. Towards a safer web world

SECURITY TESTING. Towards a safer web world SECURITY TESTING Towards a safer web world AGENDA 1. 3 W S OF SECURITY TESTING 2. SECURITY TESTING CONCEPTS 3. SECURITY TESTING TYPES 4. TOP 10 SECURITY RISKS ate: 2013-14 Few Security Breaches September

More information

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering

More information

Bite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs. January 27, 2016

Bite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs. January 27, 2016 Bite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs January 27, 2016 1 Agenda About Me Silicon Labs Who are we? What do we do? Applications Engineering Functions Skills needed IoT

More information

RSA Fraud & Risk Intelligence Solutions

RSA Fraud & Risk Intelligence Solutions RSA Fraud & Risk Intelligence Solutions Separating Customers from Criminals May 2015 1 Mobile Social Identities IOT Alternative Authentication Market Disruptors Biometrics Cross Channel Intelligence Sharing

More information

5/15/2009. Introduction

5/15/2009. Introduction Part 1: Cyber-Graffiti You know, I don t know what I hate more, wearing your face, or wearing your body. Look, why don t we just give them back to each other and call it even, okay? Castor Troy (Nicolas

More information