A New Security Platform for High Performance Client SoCs
|
|
- Miles Griffin
- 5 years ago
- Views:
Transcription
1 A New Security Platform for High Performance Client SoCs Udi Maor, Sr. Product manager, Client Line of Business October 2018
2 Agenda What are Client devices? Arm s approach to Trusted Execution on Client devices Introducing CryptoCell-713 Features in CryptoCell-713 Our motivation: Life Cycle of embedded security Premium content AI/ML algorithms Introducing CryptoCell-703 Summary Q&A 2
3 What are Client devices? 3
4 Arm s approach to Trusted Execution on Client devices TBSA TBBR & TF-A System & Security IP TrustZone 4
5 Introducing CryptoCell-713 Enabling a robust, up-to-date, TEE Performant and efficient SM2/3/4 Side Channel Attack countermeasures Robust asset isolation Up to 10s of Man Years saved 5
6 A (simplified) Life Cycle of embedded security Feature introduced Adopted by the market Value is increased Becomes prone to attacks Robustness rules are updated Cost/Effort To Attack SW security HW based security Physical security Asset value 6
7 Client security trends Premium content Feature introduced Adopted by market Value increases Becomes prone to attacks Robustness rules updated
8 Client security trends AI/ML algorithms TBD? Feature introduced Adopted by market Value increases Becomes prone to attacks Robustness rules updated 8 nsorflow-on-android
9 Features in CryptoCell-713 Keeping: CryptoCell-712 s feature set, including FIPS certifiability Adding: High performance SM2, SM3 and SM4 TZMP readiness Side Channel Attacks mitigation option Enhancing: Robustness of Secure Boot (code loading) Robustness of provisioning 9
10 CryptoCell s performance and efficiency benefits Arm invests in the pre-integration of CryptoCell with other IPs (CPUs, MM, System) Sub-systems such as SGM-775 Demos such as the TZMP1 demo presented at Linaro Connect Clear benefits of CryptoCell efficiency in real-life use cases: Up to 20X less dynamic power consumption (SGM-775) 80% increased throughput compared to software in TZMP use-case 10
11 Decryption Differences Decryption running on CPU Decryption running on CryptoCell Flickering is visible No flickering 11
12 Decryption Differences Decryption running on CPU Decryption running on CryptoCell Flickering is visible - Load average is higher than number of cores No flickering - Load average is lower than number of cores 12
13 Time-to-Market savings CryptoCell-713 is FIPS certifiable, similar to the recent CryptoCell-712 certification Best practices and reference security policy available to partners FIPS readiness alone can save SiPs/OEMs over 10MY of effort Chinese ciphers are designed to be GM/T compliant 13
14 Introducing CryptoCell-703 Focused on new requirements for using Chinese ciphers In case the only missing functionality is SM2/3/4 Side Channel Attacks mitigation option 14
15 Summary The Client trusted execution landscape is evolving Arm offers 2 new CryptoCell products to enable comprehensive, up-to-date TEEs, while keeping Time- To-Market short 15
16 Questions? 16
17 Thank You! Danke! Merci! 谢谢! ありがとう! Gracias! Kiitos! 감사합니다 धन यव द 17
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationWAVE ONE MAINFRAME WAVE THREE INTERNET WAVE FOUR MOBILE & CLOUD WAVE TWO PERSONAL COMPUTING & SOFTWARE Arm Limited
WAVE ONE MAINFRAME WAVE THREE INTERNET WAVE FOUR MOBILE & CLOUD WAVE TWO PERSONAL COMPUTING & SOFTWARE Artificial Intelligence Fifth wave Data-driven computing era IoT Generating data 5G 5G Transporting
More informationTZMP-1 Software Reference Implementation. Ken Liu 2018-Mar-12
TZMP-1 Software Reference Implementation Ken Liu 2018-Mar-12 2018 Arm Limited Content DRM Applications and Secure Video Path Regular Secure Video Path Design with Trustzone TZMP1 Design Concepts Reference
More informationThe Changing Face of Edge Compute
The Changing Face of Edge Compute 2018 Arm Limited Alvin Yang Nov 2018 Market trends acceleration of technology deployment 26 years 4 years 100 billion chips shipped 100 billion chips shipped 1 Trillion
More informationBeyond TrustZone Part 1 - PSA
Beyond TrustZone Part 1 - PSA Rob Coombs Security Director, Arm Arm Tech Symposia 2017, Hsinchu Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security
More informationA Secure and Connected Intelligent Future. Ian Smythe Senior Director Marketing, Client Business Arm Tech Symposia 2017
A Secure and Connected Intelligent Future 1 2017 Arm Copyright Limited Arm 2017 Ian Smythe Senior Director Marketing, Client Business Arm Tech Symposia 2017 Arm: The Industry s Architecture of Choice 50
More informationDPDK on Arm64 Status Review & Plan
DPDK on Arm64 Status Review & Plan Song.zhu@arm.com Yi.He@arm.com Herbert.Guan@arm.com 19/03/2018 2018 Arm Limited DPDK Overview Data Plane Development Kit A set of libraries and drivers for fast packet
More informationConnect your IoT device: Bluetooth 5, , NB-IoT
Connect your IoT device: Bluetooth 5, 802.15.4, NB-IoT Prithi Ramakrishnan Arm TechTalk 2017 IoT connectivity technologies Multiple standards, different applications Throughput Unlicensed >100Mbps Wi-Fi
More informationBeyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop
Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland
More informationOptimize HPC - Application Efficiency on Many Core Systems
Meet the experts Optimize HPC - Application Efficiency on Many Core Systems 2018 Arm Limited Florent Lebeau 27 March 2018 2 2018 Arm Limited Speedup Multithreading and scalability I wrote my program to
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More informationImplementing debug. and trace access. through functional I/O. Alvin Yang Staff FAE. Arm Tech Symposia Arm Limited
Implementing debug and trace access through functional I/O Alvin Yang Staff FAE Arm Tech Symposia 2017 Agenda Debug and trace access limitations A new approach Protocol based Bare metal vs mission mode
More informationBeyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited
Beyond TrustZone PSA Rob Coombs Security Director Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security analyses Summary
More informationAccelerating intelligence at the edge for embedded and IoT applications
Accelerating intelligence at the edge for embedded and IoT applications Arm Tech Symposia 2017 Agenda The emergence of intelligence at the edge Requirements for intelligent edge computing IP and technologies
More informationBringing Intelligence to Enterprise Storage Drives
Bringing Intelligence to Enterprise Storage Drives Neil Werdmuller Director Storage Solutions Arm Santa Clara, CA 1 Who am I? 28 years experience in embedded Lead the storage solutions team Work closely
More informationConnect Your IoT Device: Bluetooth 5, , NB-IoT
Connect Your IoT Device: Bluetooth 5, 802.15.4, NB-IoT Craig Tou Business Development Manager, Arm Arm Tech Symposia 2017, Taipei IoT Devices - Everything Connects New classes of connectivity for a new
More informationAccelerate Ceph By SPDK on AArch64
Accelerate Ceph By on AArch64 Jun He, jun.he@arm.com 2018 Arm Limited Tone Zhang, tone.zhang@arm.com 2018/3/9 2018 Arm Limited What s? Storage Performance Development Kit A set of tools and libraries to
More informationFundamentals of HW-based Security
Fundamentals of HW-based Security Udi Maor CryptoCell-7xx Product Manager Systems and SW Group ARM Tech Forum 2016 - Korea Jun. 28, 2016 What is system security design? Every system design will require
More informationUnleash the DSP performance of Arm Cortex processors
Unleash the DSP performance of Arm Cortex processors Arm Tech Symposia 2017 Lionel Belnet Senior Product Manager Agenda Unleash the DSP performance of Cortex processors 1 Introducing Arm Cortex technology
More informationDynamIQ Processor Designs Using Cortex-A75 & Cortex- A55 for 5G Networks
DynamIQ Processor Designs Using Cortex-A75 & Cortex- A55 for 5G Networks 2017 Arm Limited David Koenen Sr. Product Manager, Arm Arm Tech Symposia 2017, Taipei Agenda 5G networks Ecosystem software to support
More informationTrustzone Security IP for IoT
Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday
More informationUsing Virtual Platforms To Improve Software Verification and Validation Efficiency
Using Virtual Platforms To Improve Software Verification and Validation Efficiency Odin Shen Staff FAE Arm Arm Tech Symposia Taiwan 2017 Software complexity and best practices Software Costs Increasing
More informationCortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving
Cortex-A75 and Cortex- DynamIQ processors Powering applications from mobile to autonomous driving Lionel Belnet Sr. Product Manager Arm Arm Tech Symposia 2017 Agenda Market growth and trends DynamIQ technology
More informationCompute solutions for mass deployment of autonomy
Compute solutions for mass deployment of autonomy Rod Watt Director of Vehicle Architecture and System Analysis Introduction 2 From inception to now 1990 Joint venture between Acorn Computers and Apple.
More informationTailoring TrustZone as SMM Equivalent
presented by Tailoring TrustZone as SMM Equivalent Tony C.S. Lo Senior Manager American Megatrends Inc. UEFI Plugfest March 2016 www.uefi.org 1 Agenda Introduction ARM TrustZone SMM-Like Services in TrustZone
More informationBuilding firmware update: The devil is in the details
Building firmware update: The devil is in the details Atsushi Haruta, IoT Services Group, Arm Arm Tech Symposia Japan 2017 Arm Mbed: Secure device management Application Cloud Mbed Cloud Secure, scalable,
More information2017 Arm Limited. How to design an IoT SoC and get Arm CPU IP for no upfront license fee
2017 Arm Limited How to design an IoT SoC and get Arm CPU IP for no upfront license fee An enhanced Arm DesignStart Building on a strong foundation Successfully used by 1000s of designers, researchers
More informationHardware- Software Co-design at Arm GPUs
Hardware- Software Co-design at Arm GPUs Johan Grönqvist MCC 2017 - Uppsala About Arm Arm Mali GPUs: The World s #1 Shipping Graphics Processor 151 Total Mali licenses 21 Mali video and display licenses
More informationHow to Build Optimized ML Applications with Arm Software
How to Build Optimized ML Applications with Arm Software Arm Technical Symposia 2018 Arm K.K. Senior FAE Ryuji Tanaka Overview Today we will talk about applied machine learning (ML) on Arm. My aim for
More informationCortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving
Cortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving Stefan Rosinger Director, Product Management Arm Arm TechCon 2017 Agenda Market growth and trends DynamIQ
More informationAdvanced IP solutions enabling the autonomous driving revolution
Advanced IP solutions enabling the autonomous driving revolution Chris Turner Director, Emerging Technology & Strategy, Embedded & Automotive Arm Shanghai, Beijing, Shenzhen Arm Tech Symposia 2017 Agenda
More informationHow to Build Optimized ML Applications with Arm Software
How to Build Optimized ML Applications with Arm Software Arm Technical Symposia 2018 ML Group Overview Today we will talk about applied machine learning (ML) on Arm. My aim for today is to show you just
More informationArm s Latest CPU for Laptop-Class Performance
Arm s Latest CPU for Laptop-Class Performance 2018 Arm Limited Aditya Bedi Arm Tech Symposia India Untethered. Connected. Immersive. Innovation continues to drive growth and performance demands on our
More informationProtecting your system from the scum of the universe
Protecting your system from the scum of the universe Gilad Ben-Yossef gilad@benyossef.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on applied cryptography and security of the upstream
More informationDynamIQ Processor Designs Using Cortex-A75 & Cortex-A55 for 5G Networks
DynamIQ Processor Designs Using Cortex-A75 & Cortex-A55 for 5G Networks Jeff Maguire Senior Product Manager Infrastructure IP Product Management Arm 2017 Arm Limited Arm Tech Symposia 2017 Agenda 5G networks
More informationConfessions of a security hardware driver maintainer
Confessions of a security hardware driver maintainer Gilad Ben-Yossef Principal Software Engineer About me My name is Gilad Ben-Yossef. I work on upstream Linux kernel cryptography and security in genera,l
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Senior Technical Marketing Manager Shenzhen / ARM Tech Forum / The Ritz-Carlton June 14, 2016 Agenda Introduction Security Foundations on Cortex-A
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases
More informationWhat is gem5 and where do I get it?
What is gem5 and where do I get it? Andreas Sandberg & Nikos Nikoleris ARM Research Why gem5? Runs real workloads Runs complex workloads like Android & ChromeOS System-level insights Device interactions
More informationSoftware Ecosystem for Arm-based HPC
Software Ecosystem for Arm-based HPC CUG 2018 - Stockholm Florent.Lebeau@arm.com Ecosystem for HPC List of components needed: Linux OS availability Compilers Libraries Job schedulers Debuggers Profilers
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations
More informationProtecting your system from the scum of the universe
Protecting your system from the scum of the universe Gilad Ben-Yossef gilad@benyossef.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on applied cryptography and security of the upstream
More informationMaking progress vs strategy
Making progress vs strategy Ian Thornton, Head of Investor Relations Arm is a subsidiary of 1 Arm update Arm refresher H1 update Increasing revenues and investments Progress vs strategy Arm in servers
More informationWhy PartnerDirect. Choice, flexibility, simplicity
Why PartnerDirect Choice, flexibility, simplicity What you will learn today Dell s Channel business PartnerDirect program Journey, success, analysts and beyond Performance Experience Action 2 Why PartnerDirect
More informationArm crossplatform. VI-HPS platform October 16, Arm Limited
Arm crossplatform tools VI-HPS platform October 16, 2018 An introduction to Arm Arm is the world's leading semiconductor intellectual property supplier We license to over 350 partners: present in 95% of
More informationRendering Structures Analyzing modern rendering on mobile
Rendering Structures Analyzing modern rendering on mobile 2018 Arm Limited Hans-Kristian Arntzen 2018-08-16 SIGGRAPH 2018 Content 1 2 3 4 5 Motivation Scene and lights Rendering structures overview Benchmark
More informationModern security for microcontrollers
The challenge of scaling IoT Modern security for microcontrollers Gaining user-trust & keeping it Milosch Meriac Principal Security Research Lead milosch.meriac@arm.com About me & my projects Principal
More informationAdvanced Software Features for the LA-950
Advanced Software Features for the LA-950 Ian Treviranus ian.treviranus@horiba.com www.horiba.com/us/particle What we ll talk about Measurement tools Data analysis tools Data verification tools Q&A One-button
More informationHow to protect Automotive systems with ARM Security Architecture
How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked
More informationStandard Cell Design and Optimization Methodology for ASAP7 PDK
ICCAD 2017 Tutorial Standard Cell Design and Optimization Methodology for ASAP7 PDK Xiaoqing Xu, Nishi Shah, Andrew Evans, Saurabh Sinha, Brian Cline and Greg Yeric Arm Inc xiaoqing.xu@arm.com 10/15/2017
More informationDiversity of. connectivity required for scalable IoT devices. Sam Grove Principal Software Engineer Arm. Arm TechCon 2017.
Diversity of connectivity required for scalable IoT devices Sam Grove Principal Software Engineer Arm Arm TechCon 2017 Introduction Mbed introduction Mbed Cloud Connect Addressing the complexity of reliably
More informationDesign Process. in an embedded system. Kasper Ornstein Mecklenburg SW/HW development engineer Arm Limited
Design Process in an embedded system Kasper Ornstein Mecklenburg SW/HW development engineer Arm in Lund Two offices; one at Ideon and one downtown (old Mistbase) Graphics, video and wireless SW, digital
More informationActivities of LPI-Japan for Human Resource Development on Linux/OSS
Activities of LPI-Japan for Human Resource Development on Linux/OSS 2011/10/18 Shinichi Matsuda Technology Manager Linux Professional Institute Japan, NPO LPI-Japan 2011. All rights reserved. Agenda Statistics
More informationSupplier Training Visual Guide
Supplier Training Visual Guide Course Agenda Log in as a Supplier RFx Response 2 Course Objectives Learn to respond to a RFx and access the contract agreements. 3 Here are some key terms you ll want to
More informationImprove the container image compatibility on Arm
Improve the container image compatibility on Arm Wei.Chen@arm.com Penny.Zheng@arm.com Edinburgh, UK / Open Source Summit Europe 2018 2018-10-24 Agenda Background Why image compatibility on Arm is an issue
More information5G Security from a Network Operator s Point of View
5G Security from a Network Operator s Point of View China Mobile 2018.3.19 @ ITU Workshop on 5G Security 1 Outline 1 Evolution of trust model from 2G to 5G 2 Major 5G security issues 3 Activities related
More informationAddressing 7nm Arm DynamIQ Cluster Design Challenges Using the Cadence Digital Implementation Flow
Addressing 7nm Arm DynamIQ Cluster Design Challenges Using the Cadence Digital Implementation Flow Shawn Hung Sr. Engineering Manager, Arm Jerry Chen Sr. AE Manager, Cadence Arm Tech Symposia 2017, Taipei
More informationArm TrustZone Armv8-M Primer
Arm TrustZone Armv8-M Primer Odin Shen Staff FAE Arm Arm Techcon 2017 Security Security technologies review Application Level Security Designed with security in mind: authentication and encryption Privilege
More informationDeep Learning on Arm Cortex-M Microcontrollers. Rod Crawford Director Software Technologies, Arm
Deep Learning on Arm Cortex-M Microcontrollers Rod Crawford Director Software Technologies, Arm What is Machine Learning (ML)? Artificial Intelligence Machine Learning Deep Learning Neural Networks Additional
More informationArm s First-Generation Machine Learning Processor
Arm s First-Generation Machine Learning Processor Ian Bratt 2018 Arm Limited Introducing the Arm Machine Learning (ML) Processor Optimized ground-up architecture for machine learning processing Massive
More informationArm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited
Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased
More informationComprehensive Arm Solutions for Innovative Machine Learning (ML) and Computer Vision (CV) Applications
Comprehensive Arm Solutions for Innovative Machine Learning (ML) and Computer Vision (CV) Applications Helena Zheng ML Group, Arm Arm Technical Symposia 2017, Taipei Machine Learning is a Subset of Artificial
More informationMachine learning for the Internet of Things
Machine learning for the Internet of Things Chris Shore Director of Embedded Solutions Arm 2018 Arm Limited April 2018 More Intelligence at the Edge Arm Cortex-M Expanding opportunity for the embedded
More informationHow Can You Trust Formally Verified Software?
How Can You Trust Formally Verified Software? Alastair Reid Arm Research @alastair_d_reid Formal verification Of libraries and apps Of compilers Of operating systems 2 Fonseca et al., An Empirical Study
More informationAdopt-a-JSR July Meeting
Adopt-a-JSR July Meeting Special Guest: Arun Gupta Bruno Souza, Heather VanCura, Martijn Verburg 1 July 2013 Welcome! You expanded wiki into eight languages: Arabic, Chinese, English, French, German, Portuguese,
More informationSecurity and Performance Benefits of Virtualization
Security and Performance Benefits of Virtualization Felix Baum mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered
More informationHow to run applications on Aziz supercomputer. Mohammad Rafi System Administrator Fujitsu Technology Solutions
How to run applications on Aziz supercomputer Mohammad Rafi System Administrator Fujitsu Technology Solutions Agenda Overview Compute Nodes Storage Infrastructure Servers Cluster Stack Environment Modules
More informationHow Can You Trust Formally Verified Software?
How Can You Trust Formally Verified Software? Alastair Reid Arm Research @alastair_d_reid Buffer over-read vulnerabilities Use after free s e i t i l i b a r e n l u v r o r r e c Logi Buffer overflow
More informationArm Mbed Edge. Nick Zhou Senior Technical Account Manager. Arm Tech Symposia Arm Limited
Arm Mbed Edge Nick Zhou Senior Technical Account Manager Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming
More informationBringing Intelligence to Enterprise Storage Drives
Bringing Intelligence to Enterprise Storage Drives Neil Werdmuller Director Storage Solutions Arm Santa Clara, CA 1 Who am I? 28 years experience in embedded Lead the storage solutions team Work closely
More informationThe Work of Containerized NFV Infrastructure on Arm Platform
The Work of Containerized NFV Infrastructure on Arm Platform Trevor Tao Tokyo 2018-06-21 Agenda Background Data Plane Acceleration on Arm Advanced CNI plugins and Use Case for Container
More informationCCIX: a new coherent multichip interconnect for accelerated use cases
: a new coherent multichip interconnect for accelerated use cases Akira Shimizu Senior Manager, Operator relations Arm 2017 Arm Limited Arm 2017 Interconnects for different scale SoC interconnect. Connectivity
More informationNon-Trusted. software. data. hardware. Open Source Secure World Software Trusted Firmware. Trusted. software. data. Update October 2018
data software Non-Trusted Trusted Open Source Secure World Software Trusted Firmware software Update October 2018 data hardware SPONSORED BY: HOSTED BY: Trusted Firmware with Open Governance Membership
More informationSIERRAWARE SIERRATEE FOR MIPS OMNISHIELD
SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD Introduction SierraTEE for MIPS OmniShield is a Global Platform compliant Trusted Execution Environment (TEE) designed for devices based on Imagination Technologies'
More informationHow Can You Trust Formally Verified Software?
How Can You Trust Formally Verified Software? Alastair Reid Arm Research @alastair_d_reid https://www.theguardian.com/business/2015/may/01/us-aviation-authority-boeing-787-dreamliner-bug-could-cause-loss-of-control
More informationIBM zenterprise System Unified Resource Manager Overview and Update
Romney White, System z Architecture and Technology SHARE in Orlando August 7-12, 2011 IBM zenterprise System Unified Resource Manager Overview and Update Agenda Introduction Management Enablement Levels
More informationTrusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague
Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims
More informationOPPORTUNITIES AND CHALLENGES OF DIGITAL TRANSFORMATION FOR ORGANISATIONS WITH MOBILE WORKERS
OPPORTUNITIES AND CHALLENGES OF DIGITAL TRANSFORMATION FOR ORGANISATIONS WITH MOBILE WORKERS Margot Lannoy Country Manager Benelux Panasonic Computer Product Solutions OVER PANASONIC COMPUTER PRODUCT SOLUTIONS
More informationGlobalPlatform Trusted Execution Environment (TEE) for Mobile
GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform
More informationOP-TEE Using TrustZone to Protect Our Own Secrets
OP-TEE Using TrustZone to Protect Our Own Secrets ROM-Code Bootloader OP-TEE Kernel Root File System ELC Europe 2017, 23.10.2017 Marc Kleine-Budde Slide 1 - http://www.pengutronix.de
More informationARM Server s Firmware Security
presented by ARM Server s Firmware Security Spring 2017 UEFI Seminar and Plugfest March 27-31, 2017 Presented by Zhixiong (Jonathan) Zhang (Cavium, Inc.) Updated 2011-06- 01 UEFI Plugfest March 2017 www.uefi.org
More informationProf. Han, Min-gyu Hansung University
DeviceWebAPI and other standardization status of OMA CD WG 2018.11.02 Prof. Han, Min-gyu Hansung University (andyhan@hansung.ac.kr) 目 次 Contents Evolution of OMA to OMA SpecWorks OMA CD WG introduction
More informationJim Gallagher Senior Technical Marketing Lead, MontaVista Software
LinuxCon Tokyo, Japan 2016 Secure IoT Gateway Jim Gallagher Senior Technical Marketing Lead, MontaVista Software Setting the Stage This presentation will focus on developing Secure Gateways (Edge Computing
More informationLinux Kernel Cryptographic API for fun and profit
Linux Kernel Cryptographic API for fun and profit Gilad Ben-Yossef Gilad Ben-Yossef gilad.benyossef@arm.com Twitter: @giladby About me My name is Gilad Ben-Yossef. I work on upstream Linux kernel cryptography
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationModernize and Transform Your Storage Network. Alain HUGUET EMEA Technical Alliance Manager for DELL EMC
Modernize and Transform Your Storage Network Alain HUGUET EMEA Technical Alliance Manager for DELL EMC Your Trusted Network for the Modern Data Center HISTORY OF INNOVATION 18+ Year Partnership Joint Engineering,
More informationWeb Programming Pre-01A Web Programming Technologies. Aryo Pinandito, ST, M.MT
Web Programming Pre-01A Web Programming Technologies Aryo Pinandito, ST, M.MT Document Formats: The evolution of HTML HTML HyperText Markup Language Primary document type for the web Transmitted using
More informationTata Hitachi JIM (Japan-India Institute for Manufacturing)
1 Tata Hitachi JIM (Japan-India Institute for Manufacturing) Presenter : Sandeep Singh, Managing Director Tata Hitachi Construction Machinery Co. Pvt. Ltd. 1 st May 2018, New Delhi 2 About Tata-Hitachi
More informationIoT It s All About Security
IoT It s All About Security Colin Walls colin_walls@mentor.com Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark of Linus Torvalds
More informationARM Trusted Firmware Evolution HKG15 February Andrew Thoelke Systems & Software, ARM
ARM Trusted Evolution HKG15 February 2015 Andrew Thoelke Systems & Software, ARM 1 ARM Trusted for 64-bit ARMv8-A A refresher Standardized EL3 Runtime For all 64-bit ARMv8-A systems Reducing porting and
More informationDr. Sergi Figuerola CTIO, M:
Dr. Sergi Figuerola CTIO, i2cat sergi.figuerola@i2cat.net @sfiguerola M: +34.675.780.950 Why Barcelona? The city of Barcelona gathers all the necessary elements to become a reference city and a pioneer
More informationPulse para editar el formato del texto de título
del texto de título Schedulability Analysis of the Arbitrated Real-Time Protocol (AR-TP) del texto del esquema Santiago Urueña, Juan Zamorano, Daniel Berjón, José A. Pulido, and Juan A. de la Puente Universidad
More informationStratum Filtering for DDoS Resilient Clouds
Stratum Filtering for DDoS Resilient Clouds Michael Waidner Joint work with Amir Herzberg and Haya Shulman A CRISP Member 8rd ACM Cloud Computing Security Workshop Vienna,
More informationHW isolation for automotive environment BoF
HW isolation for automotive environment BoF Michele Paolino m.paolino@virtualopensystems.com AGL All Member Meeting 2016, 2016-09-07, Munich, Germany http://www.tapps-project.eu/ Authorship and sponsorship
More informationHACK MY CHIP: A RED TEAM BLUE TEAM APPROACH FOR SOC SECURITY. David HELY Grenoble INP Esisar LCIS, Valence
Hack My chip: A red Team Blue Team Approach 1 HACK MY CHIP: A RED TEAM BLUE TEAM APPROACH FOR SOC SECURITY David HELY Grenoble INP Esisar LCIS, Valence david.hely@grenoble-inp.fr Hack My chip: A red Team
More informationImproving Security in Embedded Systems Felix Baum, Product Line Manager
Improving Security in Embedded Systems Felix Baum, Product Line Manager The Challenge with Embedded Security Business Imperatives Security Imperatives I need to keep my production expenses as low as possible.
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationArtificial Intelligence Enriched User Experience with ARM Technologies
Artificial Intelligence Enriched User Experience with ARM Technologies Daniel Heo Senior Segment Manager Mobile, BSG, ARM ARM Tech Forum Singapore July 12 th 2017 Global AI survey: the world is ready 71
More informationSmart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security
Smart Meter Security Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Grids: Advanced power control, intelligence and communications New Business models and Services
More information