Connected Cars & Security Challenges. Stéphane Desneux CTO at IoT.bzh
|
|
- Reynard Kelly
- 5 years ago
- Views:
Transcription
1 Connected Cars & Security Challenges Stéphane Desneux CTO at IoT.bzh Printemps des Entreprises IUT Vannes 15 Mars 2016
2 Agenda IoT.bzh & AGL Project Connected Cars Security: Issues and Solutions Conclusion Q&A 2
3 IoT.bzh & AGL Project 3
4 IoT.bzh Specialized on Embedded & IoT systems Strong Open Source culture Expertise domains: System architecture Security Application Framework Graphics & Multimedia Middleware & Connectivity Linux Kernel Located in Vannes - Brittany, France 4
5 My definition of IoT IoT: acronym for Internet of Things Network of physical objects composed of: Electronics Software Sensors Connectivity Multiple data exchanges with: Operators and final users Object Manufacturer Other local or remote IoT devices Cloud services 5
6 IoT Revolution IoT is hype but the buzz is justified: 2020: 25 to 50 billion objects (Gartner) IoT market will generate around $2000 billion of economic benefits Strong impact in many human activities: Home automation, Domestic appliances Transportation, Storage, Energy Healthcare, Life science, Wearables Financial, Insurance & Legal services... Connected Cars are part of this revolution Many constraints, interactions and domains to cover 6
7 AGL Project Hosted by the Linux Foundation Goal: build a reference Automotive Linux Distribution Open Source project Specifications are open Source code is open Project management is public IoT.bzh works for Renesas (Platinum member of AGL) 7
8 IoT.bzh contributions to AGL Changes on Gerrit 4% 2% 4% 30% 6% 20% 27% Panasonic IoT.bzh Linux Foundation Jaguar Land Rover Denso Qt Company Renesas Microchip Konsulko Mentor Fujitsu-Ten Pioneer Wind River 8
9 Connected Cars 9
10 What is an Automotive system? Homescreen AM/FM radio HVAC control Geolocation Media Player Phone Rear cameras & radars Navigation helper Application manager Driver assistance Diagnostics 10
11 Connected Cars: sensors Many Sensors / Signals to handle Vehicle parameters: engine, transmission, energy, diagnostics as usual GPS IR/Visible spectrum Cameras Radar/Lidar/Microwave/IR/Ultrasound sensors Accelerometers, Gyroscope, Magnetometers (9 DOF chips) Weather sensors... ADAS (Advanced Driver Assistance System) example Toyota ADAS: 11
12 Toyota ADAS <Video Toyota> 12
13 Connected Cars: connectivity Multiple channels 3G/4G Wifi Bluetooth Low energy networks (6LowPAN, SIGFOX )... Example: interaction with passengers devices Ford SDL: 13
14 Ford SDL <Video Ford> 14
15 Connected Cars: services 15
16 Security: Issues and Solutions 16
17 Why Securing Connected Cars? Attacking cars is a viable business Expensive piece of equipment Huge Mass market Enough customers to steal from But attacking cars is complex & expensive, no? Yes, but hackers have both time & money! Betting on hackers lack of skills is a very risky bet One single small security hole might be enough Automotive industry has limited knowledge and return of experience on being connected Car will be Connected & Connected Car will be Attacked 17
18 Security Fundamentals (1) Minimize attack surface area (2) Control the code which is run (3) Provide a bullet-proof update model (4) Apply security patches within days rather than weeks (5) Leverage HW security helpers (6) Isolate & compartmentalize wherever possible (7) Analysis and report of incidents (8) Development and QA with security turned on (9) Provide adequate tools to develop with security enabled (10) Do not rely on humans but on platform 18
19 Security/Complexity Mitigation Security Mechanisms might be short circuit Lack of knowledge Performances Time-to-market Cost concerns Embedded Security Expert is a rare animal 9M Mobile Developers 8M Web Developers 0.5M Embedded Developers How many Embedded Security Developers? Security cannot be added after the fact Must consist in built-in APIs & be transparent to applications Developers SHOULD NOT be in charge of security Baked in from day one: Architecture, Dev, QA, Maintenance,etc. 19
20 Layered Architecture Client/UI (untrusted) Risk of code injection (HTML5/QML) UI on external devices (Mobiles, Tablets) Access to secure service APIs only [REST] Applications & Services (semi-trusted) Unknown developers & Multi-source High-grain protection by Linux UserIDs & SMACK labels Run under control of Application Framework: need to provide a security manifest Platform & System services (trusted) D-Bus Services started by systemd Fine grain privilege provided by Cynara (privileges manager) Part of baseline distribution and certified services only 20
21 Layer/Service Segregation Run services not as root - systemd is your friend Create a dedicated UID per service Use MAC & DAC to minimize open access Drop privileges POSIX privileges MAC privileges Use CGroups Control RAM/CPU/IO Reduce offending power Use Namespaces Limit access to private data Limit access to connectivity Allows containerization 21
22 Need for Resilient Architecture Smart Multi Layers Security Architecture Breaking an application should not break a full layer Breaking a layer should not break the full system Compromised ID/keys are lost for good Per-device unique ID Per-device symmetric keys Use HW ID protection Non-Reproductibility of breakages Breaking in one car should not extend to all models / all cars Dev/Debug I/O, Sockets, should be disabled No Root Password & No shared super-user RSA key Password, when used, should not be easy to compute 22
23 AGL : use SMACK for MAC! Simplified Mandatory Access Control Kernel implemented as a Linux Security Module (LSM) since Safe principle: NO RULE = NO ACCESS and as a consequence: WHAT IS NOT EXPLICITELY AUTHORIZED IS FORBIDDEN! Smack access rules are defined by triplets: Subject Object Permissions Example: The rule ( System User rwx) allows processes running with label System to read, write and execute files with label User 23
24 AGL : Application Framework Contains a Package manager Package Installation Package Uninstallation Package Upgrade Application Lifecycle: Start (Pause Resume) Stop Event & signals propagation Privileges granting & checking API for interaction with applications 24
25 AGL : Action! 25
26 Conclusion 26
27 AGL and IoT Connected Cars are IoT devices AGL can reuse/adopt some methods, mechanisms, protocols and source code coming from generic IoT systems Example: Ostro ( IoT systems may benefit from some base AGL components Security framework Application framework 27
28 Security aspects Strong isolation & compartmentalization are required Untrusted applications should never have direct accesses and should always use intermediate APIs Platform services must be protected with privileges Shortcuts remain possible Services not compatible with a full isolation model can still bypass the security framework while still benefiting partially of it Reduce costs of development Security must be baked into the platform, not added later Developpers shouldn't take care of security Application Framework is a mandatory feature and structuring component. 28
29 Q&A Gulf of Morbihan, south of Brittany, France 29
30 Links IoT.bzh: AGL: Linux Foundation: 30
Application & Security Framework AGL-2.0 Architecture Proposal. Winter/AGL-AMM Tokyo 2016 Fulup Ar Foll Lead Architect
Application & Security Framework AGL-2.0 Architecture Proposal Winter/AGL-AMM Tokyo 2016 Fulup Ar Foll Lead Architect fulup@iot.bzh Who Are We? Fulup Ar Foll Lead Architect Stéphane Desneux Manuel Bachmann
More informationSecurity and privacy in your embedded systems
Security and privacy in your embedded systems Strong isolation of applications using Smack and Cynara José Bollo security at IoT.bzh jose.bollo@iot.bzh IoT.bzh Specialized on Embedded & IoT Contributing
More informationIntroduction to application framework
Introduction to application framework for AGL Version 1.0 June 2016 Abstract This document presents the application framework created by IoT.bzh for AGL. Document revisions Date Version Designation Author
More informationX(cross) Development System make AGL application development easier. July 2017 Sébastien Douheret
make AGL application development easier Sébastien Douheret sebastien.douheret@iot.bzh IoT.bzh Located in France - Brittany ( Vannes / Lorient / Rennes ) People background: 40% coming from Tizen IVI (Intel+Samsung)
More informationX(cross) Development System make AGL application development easier. December 2017 Sébastien Douheret
make AGL application development easier Sébastien Douheret sebastien.douheret@iot.bzh IoT.bzh Located in France - Brittany ( Vannes / Lorient / Rennes ) People background: 40% coming from Tizen IVI (Intel+Samsung)
More informationCreating a profile from Tizen:Common. Stéphane Desneux Senior Software Engineer Eurogiciel
Creating a profile from Tizen:Common Stéphane Desneux Senior Software Engineer Eurogiciel Eurogiciel IT Services Company Open source development and integration:
More informationTizen IVI Architecture New features. Dominig ar Foll, Intel Open Source
Tizen IVI Architecture New features Dominig ar Foll, Intel Open Source Agenda What is Tizen IVI How to join the project Our road map Architecture New Features 2 What is Tizen IVI Tizen IVI Support Intel
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationTizen IVI Architecture New features
Tizen IVI Architecture New features, Intel Open Source dominig.arfoll@fridu.net Agenda 2 What is Tizen IVI How to join the project Our road map Architecture New Features Tizen IVI Support Intel and ARM
More informationTizen-Meta as Security and Connectivity Layers For Yocto Project
Tizen-Meta as Security and Connectivity Layers For Yocto Project () dominig.arfoll@fridu.net October 2014 Tizen-Meta What is Tizen How to build Tizen with Yocto tools Which Connectivity is available with
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including
More informationUSING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage
More informationSecuring the Connected Car. Eystein Stenberg Product Manager Mender.io
Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationSecuring Devices in the Internet of Things
AN INTEL COMPANY Securing Devices in the Internet of Things WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationOperating System Security
Operating System Security Operating Systems Defined Hardware: I/o...Memory.CPU Operating Systems: Windows or Android, etc Applications run on operating system Operating Systems Makes it easier to use resources.
More informationLINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER
Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Flexible and connected platforms are core components in leading computing fields, including
More informationSecuring the Connected Car. Eystein Stenberg CTO Mender.io
Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationManaging IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services
Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our
More informationINSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom
INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements
More informationLeveraging webos Technologies for Automotive. Lokesh Kumar Goel / Steve Lemke
Leveraging webos Technologies for Automotive Lokesh Kumar Goel / Steve Lemke Agenda LG Silicon Valley Lab (SVL) Background LG SVL AGL Demo at CES 2018 webos Open Source Edition (OSE) webos Web App Runtime
More informationAzure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft
Azure Sphere: Fitting Linux Security in 4 MiB of RAM Ryan Fairfax Principal Software Engineering Lead Microsoft Agenda o o o o Intro to Azure Sphere Kernel Customizations User mode services / App Model
More informationSECURIFY: A COMPOSITIONAL APPROACH OF BUILDING SECURITY VERIFIED SYSTEM
1 SRIFY: A COMPOSITIONAL APPROACH OF BUILDING SRITY VERIFIED SYSTEM Liu Yang, Associate Professor, NTU SG-CRC 2018 28 March 2018 2 Securify Approach Compositional Security Reasoning with Untrusted Components
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationKorea ICT Market Overview. Yoonmi Kim Finpro Korea
Korea ICT Market Overview Yoonmi Kim Finpro Korea 5G Advanced Network Key Players Network Service Provider Electronics Company Car and Car Component Company - 5G Antenna Technoloies for Mobile device and
More informationsystemd integration and user management José Bollo
systemd integration and user management José Bollo jose.bollo@iot.bzh Overview of applications Same ECU Security Context S Binder Security Context A Effective API Binder Shadow API local API Transport
More informationBuilding a Remote Control Robot with Automotive Grade Linux
Building a Remote Control Robot with Automotive Grade Linux Leon Anavi Konsulko Group leon.anavi@konsulko.com Embedded Linux Conference Europe 2017 23-25 October, Prague, Czech Republic Agenda Overview
More informationVirtualizaton: One Size Does Not Fit All. Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software
Virtualizaton: One Size Does Not Fit All Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software Agenda Linux and Automotive Challenges Solution: Virtualization Linux Containers Best
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationRegulation and the Internet of Things
Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions
More informationSecurity for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics
Security for Secure IoT: Advanced Architectures for IoT Gateways Simon Forrest Director of Segment Marketing, Consumer Electronics www.imgtec.com Imagination Technologies Company overview A world leader
More informationA new Distributed Security Model for Linux Clusters
A new Distributed Security Model for Linux Clusters Makan.Pourzandi@Ericsson.Com Open Systems Lab Montréal Canada June, 2004 Rev PA1 07/05/04 1 Outline Context Distributed Security Distributed Access Control
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationAUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE
www.qnx.com AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE OVERVIEW Dear colleagues in the automotive industry, We are in the midst of a pivotal moment in the evolution of the car. Connected
More informationOWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati
OWASP TOP 10 2017 Release Andy Willingham June 12, 2018 OWASP Cincinnati Agenda A quick history lesson The Top 10(s) Web Mobile Privacy Protective Controls Why have a Top 10? Software runs the world (infrastructure,
More information6.858 Quiz 2 Review. Android Security. Haogang Chen Nov 24, 2014
6.858 Quiz 2 Review Android Security Haogang Chen Nov 24, 2014 1 Security layers Layer Role Reference Monitor Mandatory Access Control (MAC) for RPC: enforce access control policy for shared resources
More informationIntroduction to Automotive Grade Linux
Introduction to Automotive Grade Linux AGL All-Member Meeting Tokyo February 20, 2018 Walt Miner ( @VStarWalt ) Community Manager, AGL, The Linux Foundation Automotive Grade Linux Collaborating to build
More informationBuilding Trust in the Internet of Things
AN INTEL COMPANY Building Trust in the Internet of Things Developing an End-to-End Security Strategy for IoT Applications WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Recent security breaches
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationLecture 3 MOBILE PLATFORM SECURITY
Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common
More informationThe Industrial Internet: Opportunities, Disruptions and Standards. Stephen Mellor Chief Technical Officer Industrial Internet Consortium
The Industrial Internet: Opportunities, Disruptions and Standards Stephen Mellor Chief Technical Officer Industrial Internet Consortium Industrial vs. Consumer Internet of Things Similar Technology Drivers
More informationChrome Extension Security Architecture
Chrome Extension Security Architecture Presenter: Jienan Liu Network, Intelligence & security Lab outline Chrome extension introduction Threats towards extension Chrome extension s security architecture
More informationSmart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017
Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationConnected Medical Devices
Connected Medical Devices How to Reduce Risks Inherent in an Internet of Things that Can Help or Harm Laura Clark Fey, Esq., Principal, Fey LLC Agenda Overview of the Internet of Things for Healthcare
More informationBuilding mbed Together: An Overview of mbed OS and How To Get Involved
Building mbed Together: An Overview of mbed OS and How To Get Involved Hugo Vincent / Product Lead mbed OS, Paul Bakker / Product Strategy, mbed IoT Device Platform mbed Sponsored Session/ ARM Tech Con
More informationCreating a Practical Security Architecture Based on sel4
Creating a Practical Security Architecture Based on sel4 Xinming (Simon) Ou University of South Florida (many slides borrowed/adapted from my student Daniel Wang) 1 Questions for sel4 Community Is there
More informationA Peer-to-Peer Approach to Digital Key Sharing for Vehicle Access & Control. Tony Rosati Director of IOT Security, ESCRYPT
A Peer-to-Peer Approach to Digital Key Sharing for Vehicle Access & Control Tony Rosati Director of IOT Security, ESCRYPT Agenda Motivation for Digital Key Sharing Architecture Security Model Security
More informationContributing to Automotive Grade Linux and GENIVI Development Platform
Contributing to Automotive Grade Linux and GENIVI Development Platform Leon Anavi Konsulko Group leon.anavi@konsulko.com Embedded Linux Conference 2017 21-23 February, Portland, Oregon Agenda Automotive
More informationAgile IoT Solution Driving Digital Transformation of Transportation
Agile IoT Solution Driving Digital Transformation of Transportation Dr. Wu Chou IEEE Fellow & CTO Enterprise Network Product Line, Huawei Products & Solutions IoT: Next Billions of Connections Smart Building
More informationHandling Top Security Threats for Connected Embedded Devices. OpenIoT Summit, San Diego, 2016
Handling Top Security Threats for Connected Embedded Devices OpenIoT Summit, San Diego, 2016 Jeep Cherokee hacked in July 2015 Presented at Black Hat USA 2015 Charlie Miller Chris Valasek Remote exploit
More informationThe Integrated Smart & Security Platform Powered the Developing of IOT
The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture
More informationThe Medeco Solution for Controlled Access and Accountability
Medeco XT The Medeco Solution for Controlled Access and Accountability Medeco XT is a powerful Intelligent Key System that uses innovative technology to deliver a flexible, cost-effective solution for
More informationB U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationM2MD Communications Gateway: fast, secure and efficient
Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular
More informationHow To Prevent Rolling Spam Factories. Ryan Ware Lead Security Architect
How To Prevent Rolling Spam Factories Ryan Ware Lead Security Architect The Onslaught Is Coming 2 SSG System Software Division Connectivity Evolution Threat Space No IP Connectivity A/V Input CD DVD Analog
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationA Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction
A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one
More informationSecurity model for embedded systems using Smack *
Security model for embedded systems using Smack * Simple but secure * Simplified Mandatory Access Control Kernel - José Bollo - Context José Bollo Eurogiciel Intel Tizen Smack Linux Smack for embeddeds
More informationMesh Networking Principles
Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,
More informationM2MD Communications Gateway: fast, secure, efficient
Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.
More informationVirtual Open Systems (VOSyS)
Virtual Open Systems (VOSyS) 2018-06-14 Company Profile contact@virtualopensystems.com 2018-05-05www.virtualopensystems.com Virtual Open Systems: Profile Virtual Open Systems (VOSyS) is a French fully
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationMultiplying disruption: Modular data centres at the edge
Multiplying disruption: Modular data centres at the edge Andrew Donoghue Director analyst relations EMEA 12.03.2019 2 Simplifying the Edge Workforce Revolution Smarter, More Efficient UPS Systems Pursuing
More informationManaged Services Rely on us to manage your business services
Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these
More informationDesigning for the Industrial Internet Accelerating the Industrial Internet of Things
Accelerating the Industrial Internet of Things 338 West Nanjing Road, 2707-09 Shanghai 200041 China www.iotone.com IoT enables Industrie 4.0. 2 Why IoT? The Internet enabled people to share information
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationConnect Vehicles: A Security Throwback
Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE
More informationPrivilege Escalation
Privilege Coleman Kane Coleman.Kane@ge.com February 9, 2015 Security Vulnerability Assessment Privilege 1 / 14 root, or Privilege or Elevation is the act of gaining access to resources which were intended
More informationPRACTICING SAFE COMPUTING AT HOME
PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationIGEEKS TECHNOLOGIES. Software Training Division. Academic Live Projects For BE,ME,MCA,BCA and PHD Students
Duration:40hours IGEEKS TECHNOLOGIES Software Training Division Academic Live Projects For BE,ME,MCA,BCA and PHD Students IGeekS Technologies (Make Final Year Project) No: 19, MN Complex, 2nd Cross, Sampige
More informationCAN Signaling Agent. A generic model to handle signals. AGL AMM Feb/2017 Fulup Ar Foll Lead Architect
CAN Signaling Agent A generic model to handle signals AGL AMM Feb/2017 Fulup Ar Foll Lead Architect fulup@iot.bzh st 1 technical Contributor Application Development Integration Yocto recipes Releases automation
More informationKuppingerCole Whitepaper. by Dave Kearns February 2013
KuppingerCole Whitepaper by Dave Kearns February 2013 KuppingerCole Whitepaper Using Information Stewardship within by Dave Kearns dk@kuppingercole.com February 2013 Content 1. Summary... 3 2. Good information
More informationImproving Security in Embedded Systems Felix Baum, Product Line Manager
Improving Security in Embedded Systems Felix Baum, Product Line Manager The Challenge with Embedded Security Business Imperatives Security Imperatives I need to keep my production expenses as low as possible.
More informationNEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS
NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from
More informationWelcome to IoTivity Developer Day. Introduction: Mark Skarpness, Intel VP & Director Embedded Operating Systems
Welcome to IoTivity Developer Day Introduction: Mark Skarpness, Intel VP & Director Embedded Operating Systems 1 IoT Challenges IoT APIs are rarely re-used They are brand-unique Communication methods are
More informationVehicle To Android Communication Mode
Technical Disclosure Commons Defensive Publications Series May 12, 2017 Vehicle To Android Communication Mode Tanmay Wadhwa Neil Dhillon Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationWhite Paper. Connected Car Brings Intelligence to Transportation
White Paper Connected Car Brings Intelligence to Transportation 2 NEXCOM White Paper As urban population grows at an exponential rate, traffic jams are becoming more hideous and driving more and more tedious.
More informationIn the Driver s Seat
In the Driver s Seat Use Cases of Qt in Automotive Dr Tuukka Ahoniemi Product Manager tuukka.ahoniemi@theqtcompany.com Contents Requirements for Automotive Systems Transition of Automotive Software Power
More informationInternet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin
Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP
More information"Charting the Course to Your Success!" Securing.Net Web Applications Lifecycle Course Summary
Course Summary Description Securing.Net Web Applications - Lifecycle is a lab-intensive, hands-on.net security training course, essential for experienced enterprise developers who need to produce secure.net-based
More informationHow Tizen Compliance Reduces Fragmentation
How Tizen Compliance Reduces Fragmentation Mats Wichmann Samsung Open Source Group mats@osg.samsung.com Topics The Problem Compliance Goals State of the program Compliance Profiles Feature comparison:
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationLinux Community Project Leaders Unite. Peter Vescuso EVP Marketing, Bus Dev Black Duck Software
Linux Community Project Leaders Unite Peter Vescuso EVP Marketing, Bus Dev Black Duck Software Agenda Trends Communities of communities Linux Community Projects 2 Innovation and FOSS - A Virtuous Circle
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationINDUSTRY-LED COLLABORATION
INDUSTRY-LED COLLABORATION EUREKA Instruments EUREKA Innovation Days 24 May 2018 Zeynep Sarılar InterCluster spokesperson & ITEA Chairwoman Full members 41 full members (40 countries + European Commission)
More informationOffense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent
Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream
More informationINSTRUMENT CLUSTER 2.0
INSTRUMENT CLUSTER 2.0 Summary THE CONTEXT Electronic Content Timeline The Challenge MAGNETI MARELLI TARGET Digital Cluster Advantages The Requirements THE SOLUTION Project Definition System PROJECT DEVELOPEMENT
More informationThe Internet of Things and Security
INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationCloud Security Standards Supplier Survey. Version 1
Cloud Security Standards Supplier Survey Version 1 Document History and Reviews Version Date Revision Author Summary of Changes 0.1 May 2018 Ali Mitchell New document 1 May 2018 Ali Mitchell Approved Version
More informationConnecting with Tizen : An Overview & Roadmap. Mohan Rao
Connecting with Tizen : An Overview & Roadmap Mohan Rao Contents What is Tizen? Why Tizen? Device profile Tizen 2.4 Tizen 3.0 What s next? Conclusion 2 What is Tizen? (1/2) Designed for various category
More informationASIC Design Starts for by Key End Market Applications
ASIC Design Starts for 2014 by Key End Market Applications February 2014 Study No. SC101-14 Copyright Semico Research, 2014. All rights reserved. Reproduction in whole or part is prohibited without the
More information