Towards a Secure Internet of Things. Stanford University Philip Levis (representing many contributors)
|
|
- Francis Stokes
- 5 years ago
- Views:
Transcription
1 Towards a Secure Internet of Things University Philip Levis (representing many contributors) 1
2 The Internet of Things (IoT) 2
3 A Security Disaster A 2014 HP security analysis of IoT devices 1 found 80% had privacy concerns 80% had poor passwords 70% lacked encryption 60% had vulnerabilities in UI 60% had insecure updates 1 3
4 Securing the Internet of Things Secure Internet of Things Project 5 year project (just started second year) 12 faculty collaborators 3 universities:, Berkeley, and Michigan Rethink IoT systems, software, and applications from the ground up Make a secure IoT application as easy as a modern web application 4
5 Team Philip Levis Embedded Systems Mark Horowitz Hardware Christopher Ré Data Analytics Dan Boneh Cryptography Dawson Engler Software Keith Winstein Networks Peter Bailis Database Systems David Mazières Security Björn Hartmann Berkeley Prototyping Raluca Ada Popa Berkeley Security Prabal Dutta Berkeley/Michigan Embedded Hardware David Culler Berkeley Low Power Systems Steve Eglash Executive Director Philip Levis Faculty Director 5
6 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles Tock: a secure embedded OS TLS-RaR: network auditing Tethys: a sample application 6
7 The EmNets Vision Information technology (IT) is on the verge of another revolution The use of EmNets [embedded networks] throughout society could well dwarf previous milestones. 1 The motes [EmNet nodes] preview a future pervaded by networks of wireless batterypowered sensors that monitor our environment, our machines, and even us. 2 1 National Research Council. Embedded, Everywhere, MIT Technology Review. 10 Technologies That Will Change the World, iii.2005 Interview Talk 2 7
8 Example Part: nrf51822 Cortex M0+ with integrated 2.4GHz transceiver Supports Bluetooth Low Energy Two models: 32kB/256kB or 16kB/128kB DigiKey cost for 25,000: $1.99 8
9 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles Tock: a secure embedded OS TLS-RaR: network auditing Macrobase: sifting through data 9
10 Internet(s) of Things Industrial Automation Home Area Networks Personal Area Networks Networked Devices Thousands/person Controlled Environment High reliability Control networks Industrial requirements Hundreds/person Uncontrolled Environment Unlicensed spectrum Convenience Consumer requirements Tens/person Personal environment Unlicensed spectrum Instrumentation Fashion vs. function Tens/person Uncontrolled Environment Unlicensed spectrum Convenience Powered WirelessHART, tsch, RPL IEEE/IIC/IETF ZigBee, Z-Wave 6lowpan, RPL IETF/ZigBee/private Bluetooth, BLE 3G/LTE 3GPP/IEEE WiFi/ TCP/IP IEEE/IETF 10
11 IoT: MGC Architecture embedded devices 6lowpan, ZigBee, ZWave, Bluetooth, WiFi, WirelessHART Gateways Cloud 3G/4G, TCP/IP End application 11
12 IoT Security is Hard Complex, distributed systems differences in resources across tiers Many languages, OSes, and networks Specialized hardware Just developing applications is hard Securing them is even harder Enormous attack surface embedded C (ARM, avr, msp430) ZigBee, ZWave, Bluetooth, WiFi 3G/4G, TCP/IP Ruby/Rails, Python/Django, J2EE, PHP, Node.js Obj-C/C++, Java, Swift, Javascript/HTML Secure Internet of Things 23 Reasoning across hardware, software, languages, devices, etc. What are the threats and attack models? Valuable data: personal, location, presence Rush to development + hard avoid, deal later 12
13 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles Tock: a secure embedded OS TLS-RaR: network auditing Tethys: a sample application 13
14 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 14
15 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 15
16 16
17 Tock Operating System Safe, multi-tasking operating system for memoryconstrained devices Core kernel written in Rust, a safe systems language Small amount of trusted code (can do unsafe things) - Rust bindings for memory-mapped I/O - Core scheduler, context switches Core kernel can be extended with capsules Safe, written in Rust Run inside kernel Processes can be written in any language (asm, C) Leverage Cortex-M memory protection unit (MPU) User-level, traps to kernel with system calls 17
18 Tock: Secure Embedded OS grant grant Processes (Any language) heap stack data RAM heap stack data Process Accessible Memory text Flash text Kernel (Rust) SPI I2C UART Console GPIO Timer HAL Scheduler Config Capsules (Untrusted) Core kernel (Trusted) 18
19 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 19
20 Model Today Transport-layer security (TLS) between devices and cloud services Internet applications: we control one end point Can install new certificates, observe data IoT applications: we are a transit network Can t see or control what happens on either end 20
21 TLS-RaR: Rotate and Release (joint work with Keith Winstein and Dan Boneh) 21
22 Device to Cloud TLS Time Handshake AES-GCM Encrypted Session Begin TCP Connection Enter TLS Session 22
23 Device to Cloud TLS Time Handshake AES-GCM Handshake AES-GCM Begin TCP Connection Enter TLS Session TLS 1.2: Renegotiate or Resume TLS 1.3: KeyUpdate 23
24 Device to Cloud TLS With a Twist Time Handshake AES-GCM Rotate Keys Reconnect, Renegotiate, Resume or KeyUpdate AES-GCM Epoch 0 Epoch 1 24
25 Device to Cloud TLS With a Twist Time Handshake AES-GCM Rotate Keys Reconnect, Renegotiate, Resume or KeyUpdate AES-GCM Epoch 0 Epoch 1 Release Previous Epoch (0) Key 25
26 Nice Properties Can audit IoT data streams Audit box's decryption yields the same stream of data as endpoints' SSL_read() calls, but delayed Audit matches what was received Format of TLS on the wire is not changed Easy to reason about security of the protocol, easy to adopt For some existing servers no change is necessary Really easy to adopt Minimal change to OpenSSL on the device Easy to reason about security of the implementation Easy to adopt 26
27 Architectural Principles Longevity: these systems will last for up to 20 years and their security must too. Transparency: we must be able to observe what our devices are saying about us. End-to-end: consider security holistically, from data generation to end-user display. 27
28 28
29 Water Use (joint work with Noah Diffenbaugh and Mark Horowitz) 29
30 Network Architecture (joint work with Noah Diffenbaugh and Mark Horowitz) ios gateway cloud embedded BLE/GATT Android gateway HTTP/REST 30 Energy harvester
31 Security/Privacy Shower data has privacy implications Streaming data: shower 5 is being used right now! Data overall has IRB/privacy implications Gateways are untrusted Owned by students, other participants May download data, never forward to cloud Network encrypts all data end-to-end between sensors and cloud Gateways cannot see data Sensors do not clean log until receiving end-to-end acknowledgement from cloud Cloud issues block acknowledgements to gateways 31
32 This Talk Technology trends: why today? Security: why is it so hard? Research: what we re doing Architectural principles Tock: a secure embedded OS TLS-RaR: network auditing Tethys: a sample application 32
33 Why Now? Technology has just reached the tipping point BLE, ibeacon Cortex M series Sensors, harvesting circuits We've been waiting Leaders in prototyping, cryptographic computation, IoT networking, secure systems, analytics, and hardware design But it's still early enough Most big applications haven't been thought of yet Let's not repeat the web (as good as it is for publications) Very interested in collaborating with industry, to help find and solve hard research problems 33
34 Securing the Internet of Things Secure Internet of Things Project 5 year project (just started second year) 12 faculty collaborators 3 universities:, Berkeley, and Michigan Rethink IoT systems, software, and applications from the ground up Make a secure IoT application as easy as a modern web application 34
35 Thank you! Philip Levis Embedded Systems Mark Horowitz Hardware Christopher Ré Data Analytics Dan Boneh Cryptography Dawson Engler Software Keith Winstein Networks Peter Bailis Database Systems David Mazières Security Björn Hartmann Berkeley Prototyping Raluca Ada Popa Berkeley Security Prabal Dutta Berkeley/Michigan Embedded Hardware David Culler Berkeley Low Power Systems Steve Eglash Executive Director Philip Levis Faculty Director 35
Towards a Secure Internet of Things
Towards a Secure Internet of Things Philip Levis Stanford University Keynote Talk IEEE International Conference on Pervasive Computing and Communication March 20, 2018 1 The Internet of Things (IoT) 2
More informationSafely and Efficiently Programming a 64kB Computer
Safely and Efficiently Programming a 64kB Computer Amit Levy a, Branden Ghena b, Bradford Campbell b, Pat Pannuto b, Prabal Dutta b, Philip Levis a MSR UW Summer Institute August 2, 2017 a University b
More informationSecure Internet of Things Project Overview. Philip Levis, Faculty Director SITP 2018 Retreat Santa Cruz, CA
Secure Internet of Things Project Overview Philip Levis, Faculty Director SITP 2018 Retreat Santa Cruz, CA Four Years Ago + = Security Disaster HP conducted a security analysis of IoT devices 1 80% had
More informationAuditing IoT Communications with TLS-RaR
Auditing IoT Communications with TLS-RaR Judson Wilson, Henry Corrigan-Gibbs, Riad S. Wahby, Keith Winstein, Philip Levis, Dan Boneh Stanford University Auditing Standard Devices MITM Used for: security
More informationBuilding a Secure Embedded Kernel in Rust
Building a Secure Embedded Kernel in Rust Amit Levy a, Branden Ghena b, Bradford Campbell b, Pat Pannuto b, Nicholas Matsakis c, Prabal Dutta b, Philip Levis a Platform Lab May 8, 2017 a Stanford University
More informationBeetle: Operating System Support for the Internet of Things
Beetle: Operating System Support for the Internet of Things Amit Levy, James Hong, Laurynas Riliskis, Philip Levis, David Mazières, and Keith Winstein The Internet of Things Ideal Future The Internet of
More informationSafely and Efficiently Multiprogramming a 64kB Computer
Safely and Efficiently Multiprogramming a 64kB Computer Amit Levy Daniel Giffin Bradford Campbell Branden Ghena Pat Pannuto Prabal Dutta Philip Levis Niklas Adolfsson Fredrik Nilsson Josh Adkins Neal Jackson
More informationWiFröst IoT Debugging IDE
WiFröst IoT Debugging IDE Instruments device code, network calls, and a local router to capture network communications and program activity Provides a time-linked data visualization and automatic checks
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationBLE to Wi-Fi Gateway
BLE to Wi-Fi Gateway Connect Bluetooth Smart devices to the cloud Low power and small form factor MQTT Protocol Support HTTP Configuration Over the air upgrade Integrating the BLE node to cloud with WiFi
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationTHE NEED FOR SMART SENSORS IN IOT. Internet. Uwe Hirsch Senior Business Development Manager
THE NEED FOR SMART SENSORS IN IOT Internet Uwe Hirsch Senior Business Development Manager Uwe.Hirsch@Avnet-Memec.eu IOT APPLICATIONS ENABLED BY DIFFERENT SENSORS Traffic Management Up to 40% of traffic
More informationBUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS
BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS PHILIP POULIDIS VIDEO TRANSCRIPT What is your name and what do you do? My name is Philip Poulidis and I m the VP and General Manager of Mobile and Internet
More informationThe Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group
1 The Internet of Things Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group Important! ٧ DREAM seminar 8 April 2014, UC Berkeley Low-Power Wireless Mesh Networks
More informationDescriptions for CIS Classes (Fall 2017)
Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer
More informationBuilding mbed Together: An Overview of mbed OS and How To Get Involved
Building mbed Together: An Overview of mbed OS and How To Get Involved Hugo Vincent / Product Lead mbed OS, Paul Bakker / Product Strategy, mbed IoT Device Platform mbed Sponsored Session/ ARM Tech Con
More informationIntegrating Custom Hardware into Sensor Web. Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic
Integrating Custom Hardware into Sensor Web Maria Porcius Carolina Fortuna Gorazd Kandus Mihael Mohorcic OUTLINE 1. Introduction 2. State of the art 3. System architecture - main components 3.1 Hardware
More informationWG5 IoT security, privacy, policy
WG5 IoT security, privacy, policy L Jean Camp Ivan Evtimov Earlence Fernandes Tadayoshi Kohno Philip Levis
More informationPERFORMANCE ANALYSIS USING NXP S I.MX RT1050 CROSSOVER PROCESSOR AND THE ZEPHYR OS
PERFORMANCE ANALYSIS USING NXP S I.MX RT1050 CROSSOVER PROCESSOR AND THE ZEPHYR OS MAUREEN HELM LEOTESCU FLORIN MARIUS CRISTIAN VLAD BENCHMARKING TEAM AGENDA Zephyr Project introduction Analysis scope
More informationBeetle: Many-to-many communication in Bluetooth LE. Amit Levy, Laurynas Riliskis, Philip Levis, David Mazières, and Keith Winstein
Beetle: Many-to-many communication in Bluetooth LE Amit Levy, Laurynas Riliskis, Philip Levis, David Mazières, and Keith Winstein The ideal Internet of Things The Internet of Things today It's Not An
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationInternet-of-Things Conference. Andrew Bickley Technology Marketing Director
Internet-of-Things Conference Andrew Bickley Technology Marketing Director Presentation today The IoT node market Technology and architecture challenges Node architectures Internet of Things Wireless Up
More informationBuilding secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On
Building secure devices on the intelligent edge with Azure Sphere Paul Foster, Microsoft Dr Hassan Harb, E.On Microcontrollers (MCUs) low-cost, single chip computers 9 BILLION new MCU devices built and
More informationAlternative Designs and Decision Making for Top Design Selection
Alternative Designs and Decision Making for Top Design Selection 1 Step 1. Generation of Alternatives (>2 Conceptual Designs) Multiple Alternative conceptual designs Optimal Solution (by balanced capability,
More informationHigh-Performance, Highly Secure Networking for Industrial and IoT Applications
High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications
More informationHOW TO INTEGRATE NFC FRONTENDS IN LINUX
HOW TO INTEGRATE NFC FRONTENDS IN LINUX JORDI JOFRE NFC READERS NFC EVERYWHERE 14/09/2017 WEBINAR SERIES: NFC SOFTWARE INTEGRATION PUBLIC Agenda NFC software integration webinar series Session I, 14th
More informationWireless-Tag WT51822-S1
Wireless-Tag WT51822-S1 Bluetooth Low Energy 4.1 Module DATASHEET Description Bluetooth Low Energy (BLE) module of WT51822-S1 is the next generation BLE4.1(Compatible With BLE4.0) module released by Wireless-Tag
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work on the part
More informationBark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University
Bark: Default-Off Networking and Access Control for the IoT James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University The IoT is everywhere So are the attacks... 1. Devices easily compromised
More informationFirmware Updates for Internet of Things Devices
Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware
More informationARM mbed Technical Overview
ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application
More informationArm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited
Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased
More informationSecurity and the Internet of Things
Security and the Internet of Things Prashant Krishnamurthy Department of Informatics and Networked Systems School of Computing and Information University of Pittsburgh 1 About Faculty member in the School
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationAmit Levy SITP Retreat, June 22, Tock: A Secure Operating System for Microcontrollers
Amit Levy SITP Retreat, June 22, 2018 Tock: A Secure Operating System for Microcontrollers Limitations of Microcontroller Sofware Low memory: ~64 kb RAM No virtual memory Can t use Linux! No isolation
More informationCONNECTING SERVICES IN IOT DESIGN
CONNECTING SERVICES IN IOT DESIGN RELOC s.r.l. Conference Lake Garda, 7-8 April 2016 Internet-of-Things Evolution of the Internet in which everyday physical objects are seamlessly integrated into the information
More informationBLE MODULE SPECIFICATIONS
WIRELESS-TAG BLE MODULE SPECIFICATIONS nrf51-01/02/dk Bluetooth Low Energy (BLE) module of nrf51-01/02 is the next generation BLE module released by SEMITRION electronics. The modules use nrf51822 from
More informationWAVE: A Decentralized Authorization Framework with Transitive Delegation
WAVE: A Decentralized Authorization Framework with Transitive Delegation Michael P Andersen, Sam Kumar, H y u n g-sin Kim, John Kolb, Kaifei C h e n, Moustafa AbdelBaky, Gabe Fierro, David E. Culler, R
More informationThe challenge with IoT
1 Agenda The challenge with IoT Sensor to Cloud solution Sensor to Cloud system details SimpleLink Sub-1GHz hardware & software solution Getting started 2 The challenge with IoT We are trying to connect
More informationResilient IoT Security: The end of flat security models. Milosch Meriac IoT Security Engineer
Resilient IoT Security: The end of flat security models Milosch Meriac IoT Security Engineer milosch.meriac@arm.com Securing a computer system has traditionally been a battle of wits: the penetrator tries
More informationMedical Device Safety in a Connected World
Mr. Clark Fortney Senior Software Engineer Medical Device Safety in a Connected World IoT Expo June 6-8 2017 1 Clark Fortney My Background 20 years designing systems & software for medical devices at Battelle.
More informationAzure Sphere Transformation. Patrick Ward, Principal Solutions Specialist
Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,
More informationSafeBricks: Shielding Network Functions in the Cloud
SafeBricks: Shielding Network Functions in the Cloud Rishabh Poddar, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy UC Berkeley Network Functions (NFs) in the cloud Clients 2 Enterprise Destination Network
More informationExperiences from a Decade Development
Experiences from a Decade of Development Philip Levis Stanford University @OSDI 2012 1 2 Back to 1999... Information technology (IT) is on the verge of another revolution The use of EmNets [embedded networks]
More informationThe IoT and Thread in PHYTEC Nodes. Jonas Remmert July 15th, 2016
The IoT and Thread in PHYTEC Nodes Jonas Remmert July 15th, 2016 Company Introduction PHYTEC Hardware Manufacturer headquartered in Mainz, Germany more than 200 employees worldwide Hardware Single Board
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationPractical real-time operating system security for the masses
Practical real-time operating system security for the masses Milosch Meriac Principal Security Engineer github.com/armmbed/uvisor ARM TechCon 25 th October 2016 Why is microcontroller security so hard?
More informationUNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM
ADVISORY ICSA-10-019-01 ZIGBEE PSEUDORANDOM NUMBER GENERATOR VULNERABILITY January 19, 2010 OVERVIEW On January 09, 2010, a security researcher published an attack on a ChipCon (CC) implementation of ZigBee
More informationARM mbed Reference Designs
ARM mbed Reference Designs Steve Ogborne Senior Engineer Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Contents Intro Smart City Sub-GHz Reference Design Wi-Fi Reference
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationIndustrial IoT Trends: WSN, LPWAN & Cloud Platforms
Industrial IoT Trends: WSN, LPWAN & Cloud Platforms Wireless sensor networks (WSN), low power wide area networks (LPWAN) and cloud-based platforms are driving growth for the industrial Internet of Things
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationTI SimpleLink dual-band CC1350 wireless MCU
TI SimpleLink dual-band CC1350 wireless MCU Sub-1 GHz and Bluetooth low energy in a single-chip Presenter Low-Power Connectivity Solutions 1 SimpleLink ultra-low power platform CC2640: Bluetooth low energy
More informationClouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018
Clouds and Things Implications of the Cloud and Internet-of-Things for SCADA/ICS April 25, 2018 Agenda for this presentation Overview of the Cloud, Fog & Internet-of-Things IoT device capabilities IoT
More informationTowards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things
Towards Trustworthy Internet of Things for Mission-Critical Applications Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Internet of Things is a game changer Organizations are benefiting from
More informationBuild the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM
Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Agenda Linaro Linaro s IoT efforts Demo Business Models Design and sell x86 chips 2016 $59.5Bn Revenue Sells
More informationHOW TO INTEGRATE NFC CONTROLLERS IN LINUX
HOW TO INTEGRATE NFC CONTROLLERS IN LINUX JORDI JOFRE NFC READERS NFC EVERYWHERE 28/09/2017 WEBINAR SERIES: NFC SOFTWARE INTEGRATION PUBLIC Agenda NFC software integration webinar series Session I, 14th
More informationETSI M2M workshop Nov 2013
Promoting the use of IP in networks of Smart Objects ETSI M2M workshop Nov 2013 Patrick Wetterwald IPSO President pwetterw@cisco.com IPSO Alliance use only @2013 Enabling the Internet of Things The IPSO
More informationOmar Alrawi. Security Evaluation of Home-based IoT Deployments
Omar Alrawi Security Evaluation of Home-based IoT Deployments About Us Astrolavos Research Lab at Georgia Tech We specialize in Network Security Measurements Work is presented on behalf of my team Omar
More informationARM TrustZone for ARMv8-M for software engineers
ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,
More informationJonas Green, Björn Otterdahl HMS Industrial Networks AB. February 22, 2017
Resource-constrained Industrial Things Proposal for the Adaptation of CoAP to EtherNet/IP Jonas Green, Björn Otterdahl HMS Industrial Networks AB February 22, 2017 Connect all devices in a factory to EtherNet/IP
More informationAn Incubator Project in the Apache Software Foundation. 13 July 2016
An Incubator Project in the Apache Software Foundation http://mynewt.apache.org/ 13 July 2016 Apache Mynewt Open Source OS for Constrained IoT MCU / Hardware independent ARM Cortex-M*, AVR, MIPS, more...
More informationThe case for ubiquitous transport-level encryption
1/25 The case for ubiquitous transport-level encryption Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, and Dan Boneh Stanford and UCL November 18, 2010 Goals 2/25 What would it take to encrypt
More informationOperating Systems Design Exam 3 Review: Spring 2011
Operating Systems Design Exam 3 Review: Spring 2011 Paul Krzyzanowski pxk@cs.rutgers.edu 1 1. Why does an IP driver need to use ARP, the address resolution protocol? IP is a logical network. An IP address
More informationTransform your data estate with cloud, data and AI
Transform your data estate with cloud, data and AI The world is changing Data will grow to 44 ZB in 2020 Today, 80% of organizations adopt cloud-first strategies AI investment increased by 300% in 2017
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More informationWireless Home Control System
WHCS UCF 1 Wireless Home Control System Project members Jimmy Campbell Computer Engineer Grant Hernandez Computer Engineer Joseph Love Electrical Engineer For Senior Design I at the University of Central
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationWeak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann
Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile
More informationTRAINING CURRICULUM 2017 Q2
TRAINING CURRICULUM 2017 Q2 Index 3 Why Security Compass? 4 Discover Role Based Training 6 SSP Suites 7 CSSLP Training 8 Course Catalogue 14 What Can We Do For You? Why Security Compass? Role-Based Training
More informationEmbedded WiFi Module for M2M and IOT
INGICS TECHNOLOGY SPECIFICATION Ver. 1C iwm021 Feb, 2015 Embedded WiFi Module for M2M and IOT size 20mmX15mm INGICS TECHNOLOGY CO., LTD. SUPPORT@INGICS.COM WWW.INGICS.COM 1 Contents Contents Introduction
More informationThe Internet of Things and Security
INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet
More informationCreating the Complete Trusted Computing Ecosystem:
FEBRUARY 2018 Creating the Complete Trusted Computing Ecosystem: An Overview of the Trusted Software Stack (TSS) 2.0 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97003 Tel (503) 619-0562 Fax
More information3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse
3 Software Stacks for IoT Solutions Ian Skerrett Eclipse Foundation @ianskerrett Copyright 2016 The Eclipse Foundation. All Rights Reserved Eclipse Foundation Not-for-profit open source foundation responsible
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 24 April 16, 2012 CPSC 467b, Lecture 24 1/33 Kerberos Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management
More informationHello [again] from the mbed Team!
1 Hello, Japan! n Hello [again] from the mbed Team! Simon Chris Dan Mihail Steve Sam Bogdan David Watarai-san And since then 2 Since the last time we welcomed Przemek Jonny Damien Martin Rohit Phew!!!
More informationM2MD Communications Gateway: fast, secure, efficient
Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.
More informationNETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple
NETWORKING 3.0 Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING Highly Available Remarkably Simple Radically Secure IP complexity is holding your business back As
More informationNeopost Security Datasheet DS-40i/64i/75i/85i/90i/95i Your security, our commitment!
Neopost Security Datasheet /64i/75i/85i/90i/95i Your security, our commitment! [- 1 -] Preface In a world where security and information integrity are playing a key role in businesses, it is important
More informationTLS 1.1 Security fixes and TLS extensions RFC4346
F5 Networks, Inc 2 SSL1 and SSL2 Created by Netscape and contained significant flaws SSL3 Created by Netscape to address SSL2 flaws TLS 1.0 Standardized SSL3 with almost no changes RFC2246 TLS 1.1 Security
More informationAvnu Alliance Introduction
Avnu Alliance Introduction Announcing a Liaison between Edge Computing Consortium and Avnu Alliance + What is Avnu Alliance? Creating a certified ecosystem to bring precise timing, reliability and compatibility
More informationProgressively Securing RIOT-OS!
+ Progressively Securing RIOT-OS! USABILITY AND NECESSITY OF SSL / TLS Slide 1 / 33 We re going to talk about: 1. Why is security important? 2. What is SSL? 3. Where is SSL being used? 4. Features: What
More informationEmbedded Systems: EmNets
Embedded Systems: EmNets April 15, 2003 Class Meeting 25 Announcement CORRECTION: Reading for today should have been Chapters 1 and 2 of Embedded Everywhere!! Reading for Thursday should have been Chapter
More informationBidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi
Bidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi 30.7B connected devices by 2020, 75.4B by 2025 Top IoT concerns Security Complex standards
More informationIOT-GATE-iMX7 Datasheet
IOT-GATE-iMX7 Datasheet Industrial Internet of Things Gateway Product Specification v.1.3 Capable, compact, affordable: i.mx7 Dual IoT-Gate has been designed to answer demanding IoT application requirements
More informationWearable Technologies
Wearable Technologies Introduction and Hardware Architecture WebValley 2015 Bojan Milosevic About Me Bojan Milosevic Researcher @ E3DA - FBK, Trento Collaborator @ Micrel Lab, DEI - University of Bologna
More information#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication
More informationConnect Your IoT Device: Bluetooth 5, , NB-IoT
Connect Your IoT Device: Bluetooth 5, 802.15.4, NB-IoT Craig Tou Business Development Manager, Arm Arm Tech Symposia 2017, Taipei IoT Devices - Everything Connects New classes of connectivity for a new
More informationSystem Requirements. Network Administrator Guide
System Requirements Network Administrator Guide 1 Beam Network Administrator Guide Suitable Technologies, Inc. May 2018 Beam is a comprehensive Presence System that couples high-end video, high-end audio,
More informationWP 4 T4.1 Demonstrator (1st Generation): The Safe Home
1 WP 4 T4.1 Demonstrator (1st Generation): The Safe Home SINTEF / Lyse / NorDan SINTEF / Lyse / NorDan 2 Why Arrowhead? To become more agile and to reuse what others have done and learn from experiences
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 24a December 2, 2013 CPSC 467, Lecture 24a 1/20 Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management and Trusted
More informationIoT Based Disaster Detection and Early Warning Device
IoT Based Disaster Detection and Early Warning Device Amjath Ali J 1, B. Thangalakshmi 2, A. Vincy Beaulah 3 1 Lecturer, Department of Electrical and Electronics Engg., Ibra college of Technology, Oman
More informationPrivacy, Discovery, and Authentication for the Internet of Things
Privacy, Discovery, and Authentication for the Internet of Things David J. Wu Ankur Taly Asim Shankar Dan Boneh Stanford University Google Google Stanford University The Internet of Things (IoT) Lots of
More informationEnabling IOT. IQRF Alliance Conference May Harald Weidinger Key Client Manager
Enabling IOT IQRF Alliance Conference May 2016 Harald Weidinger Key Client Manager IQRF Alliance Conference, May 2016 2 Vision, Mission & Goals Vision : Make Microchip a leading provider of IoT ecosystems,
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationPBLN52832 DataSheet V Copyright c 2017 Prochild.
PBLN52832 DataSheet V1.2.3 Copyright c 2017 Prochild. No part of this publication and modification may be reproduced without the prior written permission of the author. Revision History No Version Date
More information