$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales

Size: px
Start display at page:

Download "$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales"

Transcription

1 WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications: EMVCo, Visa CC EAL6+ US and EU Governments 50 billion connected devices by 2020 $263 billion In related service spending by 2020 Key Provisioning Benefits Keys can be provisioned at any stage of manufacturing Reduced liabilities: no sensitive key material is exposed in the supply chain Lower total cost of ownership scales with market growth IoT Market Industrial Automotive Health Wearables Smart grid Home Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales Even the most innocuous IoT endpoints (webcams, DVR recorders, light bulbs) need protection, as demonstrated in the September 2016 Mirai cyber attack. The exploitation of these types of nodes led to a large scale disruption of Internet services. The economic impact of such attacks can be huge, however they are only an early warning of what is to come. The best way to protect against the expansion of these threats is to prioritize the integration of appropriate and affordable security measures for all IoT devices from endpoints, to hosts, hubs and the cloud. Important barriers that hold back this integration are high cost, inflexibility, and lack of scalability of legacy key injection models. In this white paper, we propose an IoT key provisioning method based on SRAM Physical Unclonable Functions. This method removes the barriers of securing a broad range of IoT devices, even resource limited endpoints, building the foundation for an Internet of things we can trust.

2 Securing IoT Devices - Current and Future Needs The IoT will connect billions of stand-alone devices in endpoints, hubs, gateways, etc., often deeply embedded in sensitive or even critical systems. Since these systems will make decisions autonomously, methods for securing these devices and their data flows need to be put in place. A device in the field needs to process data securely, authenticate to the network, set up secure connections with other devices and register to services. Modern security systems in smart devices use cryptography as a basic tool. The main cryptographic functions used in security systems are encryption and authentication. These primitives depend on a secret key. There are two main problems with the secret keys: I. secret keys have to be kept secret II. secret keys have to be generated and injected into the devices The first problem is addressed in another white paper 1. In this white paper we will concentrate on topic II. Root Key Bootstrapping the cryptographic system of a device requires a root key. The process of installing a cryptographic root key on devices is called Root Key Provisioning (RKP). Furthermore, cryptographic algorithms and keys should be protected or separated from the application software in some Security Subsystem. This is a secure area inside the device that can not be tampered with and deals securely with root keys and hence can be trusted. It interacts via an Application Programming Interface (API) with the rest of the system. From One Key, Many Once root keys are properly installed, the security subsystem is able to provide cryptographic services for authentication, encryption and key management to the OS and software programs running on the CPU. On top of this, an Application Key Provisioning (AKP) system enables software, middleware, the OS, applications and services to provision their own application keys securely into the security subsystem. Security Compromises The large number of devices within the IoT puts additional constraints on the way device keys are generated, stored, managed and provisioned. The current techniques always demand a difficult trade-off between the level of security and the size, complexity and cost of the security measures (strength of the keys, footprint of the cryptographic software, ). For a successful IoT security implementation, such a trade-off is not workable and is causing many IoT devices to ship without adequate protection. Hence they can be misused as we have seen in the September 2016 Mirai attack on the Internet. 2 In summary, securing billions of IoT devices requires a low-cost solution, deployable from expensive high-end chips to low-end controllers and sensors. 1 SRAM PUF: The secure silicon fingerprint. 2 Heightened DDoS Threat Posed by Mirai and Other Botnets 2

3 Key Provisioning in Today s Supply Chain In today s supply chain the root keys are generated outside the electronic devices and injected during the production process. We briefly explain the essential components of this method in today s supply chain and review its shortcomings and limitations. Roles in Today s Supply Chain The Original Equipment Manufacturer (OEM) designs products based on available IP, including both hardware (micro controllers, wireless connectivity chips, video accelerators, etc.) and software (operating system, device management middleware, applications, etc.) components. The Silicon Manufacturer (SM) develops a wide variety of integrated circuits, ASICs, SoCs, ASSPs (chips) out of which the OEM choses the right part for their product needs. The SM delivers the required chips to the OEM s supply partners. The Contract Manufacturer (CM) uses design files from the OEM to produce printed circuit boards, places the chips from multiple SMs onto them and assembles the products. The CM is also responsible for loading and testing the software that is installed on the products before they ship to the end-user. The Application Provider (AP) builds applications that can be loaded on the products in the field, allowing the end-users to connect to cloud services, add features, and update their product throughout its lifetime. The end-user adds additional applications from various application providers that may connect to cloud services. Shortcomings and Limitations of Legacy Key Provisioning Within the legacy model, RKP needs to be done early in the supply chain typically at the SM (see Figure 1). For example, the AKP is done by an Application Provider (AP) in the field to set up a secure channel with a cloud service. Silicon Mfg. Contract Mfg. System OEM Application Provider Root Key Application Keys Chip Production Device Manufacturing Use in the Field Figure 1.: Supply chain and key provisioning of electronic devices from Silicon Manufacturer to end-user.! 3

4 Most widely used embedded key storage methods are based on One-Time Programmable (OTP) memory such as fuses and anti-fuses, or on Non-Volatile Memory (NVM) such as EEPROM and Flash. With these memory types, the provisioning of root keys comes with trade-offs between flexibility, key-exposure liability, cost and security. Keys stored in fuses and anti-fuses are programmed with special equipment early in the supply chain, typically by the SM or its distributor. The parties that handle the chips later in the chain do not have access to the programming functionality as it is typically controlled by the SM. Hence, the OEM either needs to hand over root keys for its devices to the SM or trust the SM to create root keys. The disadvantages are: i) an undesired liability for the SM to correctly handle all the keys for the different OEM customers, ii) higher costs for the OEM as the SM charges costs for key programming, testing and handling, iii) Chip cannot be re-used (bound to OEM). Keys stored in EEPROM or Flash memory on the other hand can be programmed in later stages in the supply chain, for example at the OEM. However, this storage type is typically designed for storing application code and not for the secure storage of sensitive key material. It can be freely accessed by the CPU on the device. Therefore the keys are vulnerable to readout attacks. The only protection method is via software obfuscation, offering very limited security. Dedicated and protected Flash storage for keys exists, but is prohibitively expensive for many types of devices. Both key storage models are not scalable when the number of devices runs into the billions. The injection of cryptographic root keys requires an additional step in the chip production process and is hence too expensive for securing billions of low-end sensors and controllers The fact that keys need to be injected from the outside early in the supply chain is a logistic challenge for the OEM/SM. The OEM needs a reliable sales forecast to order the right number of root key provisioned chips. When too many chips are ordered he suffers a loss while ordering not enough chips leads to late deliveries and hence loss of market share. Keys Extracted from a Chip s Silicon Fingerprint The SRAM PUF SRAM Physical Unclonable Functions or PUFs use the behavior of standard SRAM memory available in any digital chip, to extract a unique pattern or silicon fingerprint. They are virtually impossible to clone or predict. This makes them very suitable for applications such as secure key generation and storage, device authentication, flexible key provisioning and chip asset management. Due to inherent deep sub-micron process variations in the production process, every transistor in SRAM cells has slightly random electric properties. This randomness is expressed in the startup values of uninitialized SRAM memory. These values form a unique chip fingerprint, called the SRAM PUF response. SRAM PUF R Fuzzy Extractor Helper Data Figure 2. One-time enrollment phase: the Fuzzy Extractor reads out an SRAM PUF response (R) and computes Helper Data.! 4

5 SRAM PUF R d1 d2 Figure 3: Key Reconstruction phase for the generation of SRAM PUF keys: The device-unique root key or PUF Key is derived from a new SRAM PUF response (R ) and Helper Data. Key derivation functions derive various symmetric keys (K1, K2, K3,...) as well as private keys (d1, d2, d3,..) and corresponding public keys (Q1,Q2, Q3, ). The blue line indicates the boundary of the Security Subsystem. d3 Helper Data Fuzzy Extractor Key Derivation Functions Public Key Crypto PUF Key Q1 Q2 Q3 K1 K2 K3 Key Provisioning based on SRAM PUF The SRAM PUF response (R) is a noisy fingerprint of the chip, and turning it into a reliable cryptographic root key requires further processing. This processing is done with a Fuzzy Extractor or Helper Data Algorithm, which is typically implemented inside a chip as Hardware or Software IP. 3 The Fuzzy Extractor has two modes of operation: Enrollment (Figure 2) and Key Reconstruction (Figure 3). In Enrollment mode, which is typically executed once over the lifetime of the chip, the Fuzzy Extractor reads out an SRAM PUF response (R) and computes so-called Helper Data. By design the Helper Data does not reveal any information on the cryptographic key and can therefore be stored in any kind of Non-Volatile Memory (NVM). Whenever the cryptographic root key is needed by the system, the Fuzzy Extractor is used in the Key Reconstruction mode. In this mode a new SRAM PUF response (R ) is read out and Helper Data is applied to correct the noise. A hash function is subsequently applied to reconstruct the cryptographic root key (PUF key). In this way exactly the same cryptographic key can be reconstructed every time and under many (environmental) circumstances. Via cryptographic key derivation functions, multiple symmetric (e.g AES, DES, ) and asymmetric (e.g. ECC) keys are derived directly from the reconstructed PUF key as indicated in Figure 3. When the device is powered off, no secret key can be found in any memory. Hence, the Fuzzy Extractor can extract a tree of cryptographic keys (starting from the PUF root key) without storing them in a non-volatile memory. Key Advantages This SRAM PUF root key extraction and derivation method has several advantages compared to the legacy key storage models (see Table 1). It offers flexibility as the root key generation and programming step can be executed at any stage in the supply chain. Method Benefits SRAM PUF OTP NVM Flexible Programming Limited Liabilities Low Cost Provisioning Secure Key Storage Uniqueness of Keys Table 1: Comparison of the benefits of the different embedded key storage types 3 J.-P. Linnartz and P. Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates, in International Conference on Audio and Video-based Biometric Person Authentication (AVBPA 03), LNCS vol. 2688, pp , Springer-Verlag 2003.! 5

6 This reduces liabilities since there is no key transfer required between the different partners in the supply chain. Costs are reduced since no keys have to be programmed in fuses by the SM. Thirdly, compared to storing keys in Flash memory, no sensitive data is found in NVM. Finally, because of the high entropy of the SRAM PUF source, uniqueness of the root keys is guaranteed by physics. It is therefore less susceptible to (human) errors in the key injection process. Scalable Key Provisioning from Silicon to Cloud Secure Application Key Provisioning The asymmetric key pair (d,q) that is derived from the SRAM PUF root key, (see Figure 3) is used for i) setting up a Certified Identity and ii ) providing a secure channel to the device by which Application Keys are provisioned. In order to set up a Certified Identity for the device, a One-Time Trust (OTT) event is needed. It combines the generation of device root keys with a certification step by a trusted party in the supply chain. The OTT event comprises the following steps: i) a public key corresponding to a PUF-derived private key gets exported from the security subsystem ii) a Trusted Party observes the key export event and signs the public key as part of a device s Identity Certificate iii) the resulting Identity Certificate is stored in the device. This requires only one trusted party located in the supply chain, unlike the legacy model where multiple parties in the supply chain need to be trusted. One-Time Trust event using SRAM PUF The root key is generated from the SRAM PUF One or more public/private key pairs are derived from the root key The device gets an Identity Certificate on its public key(s) Minimal trust base: a trusted party assures that only public keys generated by authentic devices are signed After a device has obtained an Identity Certificate as defined above, other parties can use the certificate to securely provision application keys. For example, an Application Provider (AP) provisions an application key to the device in the field with its Provisioning Server. First, the Provisioning Server validates the device certificate with the public key of the Trusted Party. Second, the AP encrypts the application key with the device s public key. Finally, the device receives and decrypts the application key with its private key inside the security subsystem. Then, it re-encrypts the application key with a symmetric root key for secure storage. As part of the second step the device may check a certificate of the application owner s Provisioning Server. The scheme above never exposes the device root key and its derived private key. They don't leave the device and are not known by any party in the supply chain. On top of this neither the OEM, nor the AP have to share any of their secrets with another party in the supply chain. In particular the SM does not have to handle any keys. This does not only reduce its liability but also simplifies its logistics. We also emphasize that as well the root key provisioning as the application key provisioning can be performed in the field. This removes any delay in the production of the chips as well as the devices, leading to higher yield and lower costs.! 6

7 Complete Provisioning Flow In Figure 4 this complete key provisioning flow is illustrated. The legacy model (Top) is compared with SRAM PUF key provisioning flow (Bottom). For the legacy model, we depict a provisioning flow based on keys in OTP memory. In this model, sensitive key material is handed over from OEM to SM in order to provision root keys (step 2). The OEM provides (public) keys to application providers (step 6) so that the AP can provision application keys to the device (step 7). In this model, keys are exposed at least at one stage and often at different stages in the supply chain. Legacy Key Provisioning 1. IC Production 2. Root key provisioning 3. IC Distribution 4. Contract Mfg. 5. Device Shipping 6. Transfer access key 7. App Key Provisioning SM CM OEM User AP Area of potential key exposure Key Provisioning using SRAM PUF 1. IC Production 2. IC Distribution 3. Contract Mfg. 4. OTT event 5. Device Shipping SM CM OEM User AP App Key Provisioning Figure 4: Legacy Key Provisioning flow - based on root keys in OTP memory (Top), compared to Key Provisioning flow based on SRAM-PUF root keys (Bottom) In the production flow based on SRAM PUF (see Figure 4, Bottom), the CM is trusted by the OEM for correctly producing its devices. The CM acts as the Trusted Party that executes the OTT event. Note that no secrets are shared during this process with other parties.! 7

8 Conclusion The described key provisioning method based on SRAM PUF has several advantages in terms of scalability, flexibility and security compared to the Legacy methods: Increased flexibility: Root keys are only installed on the chip during the OTT step, which can be done at any suitable stage in the production process. Scalability: No additional hardware, or hardware modification is needed to deploy. The fact that SRAM is universally available in any digital chip and that only a very limited amount of SRAM is needed, makes the method scalable to all kinds of IoT devices from low-end to high-end. Reduced liabilities: No sensitive key material is handed over to the SM, reducing liabilities. Up to the point where the OTT event is executed, the chips are blank with respect to any keys and hence they can be sold to any OEM. Reduced costs: The SM does not have to install an HSM for injecting keys and doesn t have to slow down its production flow for injecting keys. He does not have to prepare chips for a specific OEM anymore, which removes minimum order requirements for the OEM and reduces costs of key handling. Hardware based security: Provisioned keys are securely stored using SRAM PUF technology and only present within the device s security perimeter for a minimal time window. Guaranteed uniqueness: Cryptographic root keys are generated from a high-entropy on-chip PUF source, guaranteeing uniqueness of the keys.! 8

9 Glossary AES AKP AP API ASIC ASSP CC EAL6+ CM CPU DDoS DES DVR ECC EEPROM EMV EMVCo, Visa HSM IC IoT IP OEM OTP OTT OS NVM PUF RKP SM SoC SRAM Advanced Encryption Standard Application Key Provisioning Application Provider Application Programming Interface Application-Specific Integrated Circuit Application-Specific Standard Product Common Criteria Evaluation Assurance Level 6 augmented: resistance to attackers with high attack potential Contract Manufacturer Central Processing Unit Distributed Denial of Service Data Encryption Standard Digital Video Recorder Elliptic Curve Cryptography Electrically Erasable Programmable Read Only Memory Europay, MasterCard and Visa standard for inter-operation of IC cards, for authenticating credit and debit card transactions Certificate issued by EMVCo for secure payment transactions (based on EMV specifications and related testing processes) Hardware Security Module Integrated Circuit Internet of Things Intellectual Property Original Equipment Manufacturer One-Time Programmable memory One-Time Trust Operating System Non-Volatile Memory Physical Unclonable Function(s) Root Key Provisioning Silicon Manufacturer System-on-a-Chip Static Random Access Memory info@intrinsic-id.com Intrinsic ID. QUIDDIKEY, and designated brands included herein are trademarks of Intrinsic ID. All other trademarks are the property of their respective owners.! 9

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and

More information

New Security Architecture for IoT. Suku Nair SMU HACNet Labs.

New Security Architecture for IoT. Suku Nair SMU HACNet Labs. New Security Architecture for IoT Suku Nair SMU HACNet Labs. Why IoT IoT Systems High coupling of physical and cyber substrates Proliferation of intrinsically small devices Integration at scale Applications

More information

EBV Personalization Services for Security Devices

EBV Personalization Services for Security Devices Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated

More information

FPGA Intrinsic PUFs and Their Use in IP Protection

FPGA Intrinsic PUFs and Their Use in IP Protection FPGA Intrinsic PUFs and Their Use in IP Protection Jorge Guajardo*,Sandeep S. Kumar*, Geert-Jan Schrijen**, and Pim Tuyls** * Philips Research Europe, Eindhoven, The Netherlands ** Business Line Intrinsic-ID,

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

From Design to Resign: Securing the Electronics Lifecycle

From Design to Resign: Securing the Electronics Lifecycle SESSION ID: STR1-R11 From Design to Resign: Securing the Electronics Lifecycle Edna Conway Chief Security Officer, Global Value Chain Cisco Systems, Inc. @edna_conway Dr. Mark Tehranipoor Intel Charles

More information

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS Christoph Krauß, christoph.krauss@aisec.fraunhofer.de Dagstuhl Seminar 11441: Science and Engineering of CPS, November 2011 Overview Introduction Securing

More information

DEMOKEY-FLEX-256-E. Demonstrator Application Usage Guide. Version 1.0 Date August 10, 2017 Status Approved Reference IID-DKFLEX-256-E-DAUG

DEMOKEY-FLEX-256-E. Demonstrator Application Usage Guide. Version 1.0 Date August 10, 2017 Status Approved Reference IID-DKFLEX-256-E-DAUG The information contained herein is proprietary to Intrinsic-ID B.V. Receipt of this document does not imply any license under any intellectual property rights of Intrinsic-ID. Demonstrator Application

More information

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1

More information

Trusted Platform Module explained

Trusted Platform Module explained Bosch Security Systems Video Systems Trusted Platform Module explained What it is, what it does and what its benefits are 3 August 2016 2 Bosch Security Systems Video Systems Table of contents Table of

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

Cybersecurity Solution in Hardware

Cybersecurity Solution in Hardware Cybersecurity Solution in Hardware Ujjwal Guin Department of Electrical and Computer Engineering Auburn University, AL, USA Cybersecurity Solution in Hardware 2 2/55 Outline Motivation Counterfeiting and

More information

DesignWare IP for IoT SoC Designs

DesignWare IP for IoT SoC Designs DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to

More information

6.857 L17. Secure Processors. Srini Devadas

6.857 L17. Secure Processors. Srini Devadas 6.857 L17 Secure Processors Srini Devadas 1 Distributed Computation Example: Distributed Computation on the Internet (SETI@home, etc.) Job Dispatcher Internet DistComp() { x = Receive(); result = Func(x);

More information

Windows 10 IoT Core Azure Connectivity and Security

Windows 10 IoT Core Azure Connectivity and Security Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a

More information

Trojan-tolerant Hardware & Supply Chain Security in Practice

Trojan-tolerant Hardware & Supply Chain Security in Practice Trojan-tolerant Hardware & Supply Chain Security in Practice Who we are Vasilios Mavroudis Doctoral Researcher, UCL Dan Cvrcek CEO, Enigma Bridge George Danezis Professor, UCL Petr Svenda CTO, Enigma Bridge

More information

Trustzone Security IP for IoT

Trustzone Security IP for IoT Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday

More information

Security in sensors, an important requirement for embedded systems

Security in sensors, an important requirement for embedded systems Security in sensors, an important requirement for embedded systems Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer AISEC Institute for Applied

More information

How to Create, Deploy, & Operate Secure IoT Applications

How to Create, Deploy, & Operate Secure IoT Applications How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections

More information

Live Demo: A New Hardware- Based Approach to Secure the Internet of Things

Live Demo: A New Hardware- Based Approach to Secure the Internet of Things SESSION ID: CCS-W04 Live Demo: A New Hardware- Based Approach to Secure the Internet of Things Cesare Garlati Chief Security Strategist prpl Foundation @CesareGarlati Securing the Internet of (broken)

More information

Building secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On

Building secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On Building secure devices on the intelligent edge with Azure Sphere Paul Foster, Microsoft Dr Hassan Harb, E.On Microcontrollers (MCUs) low-cost, single chip computers 9 BILLION new MCU devices built and

More information

ENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS

ENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS ENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS SAFE HARBOR NASDAQ: DAIO The matters that we discuss today will include forwardlooking statements that involve risks factors that could cause Data

More information

Date: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.

Date: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc. Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification

More information

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat

More information

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview SECURITY CRYPTOGRAPHY Cryptography Overview Brochure Cryptography Overview DPA-resistant and Standard Cryptographic Hardware Cores DPA (Differential Power Analysis) Resistant Hardware Cores prevent against

More information

Azure Sphere Transformation. Patrick Ward, Principal Solutions Specialist

Azure Sphere Transformation. Patrick Ward, Principal Solutions Specialist Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

Securing IoT with the ARM mbed ecosystem

Securing IoT with the ARM mbed ecosystem Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into

More information

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems

More information

The Next Steps in the Evolution of Embedded Processors

The Next Steps in the Evolution of Embedded Processors The Next Steps in the Evolution of Embedded Processors Terry Kim Staff FAE, ARM Korea ARM Tech Forum Singapore July 12 th 2017 Cortex-M Processors Serving Connected Applications Energy grid Automotive

More information

CardOS Secure Elements for Smart Home Applications

CardOS Secure Elements for Smart Home Applications Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

Trusted Platform Modules Automotive applications and differentiation from HSM

Trusted Platform Modules Automotive applications and differentiation from HSM Trusted Platform Modules Automotive applications and differentiation from HSM Cyber Security Symposium 2017, Stuttgart Martin Brunner, Infineon Technologies Axiom: Whatever is connected can (and will)

More information

Introducing Hardware Security Modules to Embedded Systems

Introducing Hardware Security Modules to Embedded Systems Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors

More information

M2MD Communications Gateway: fast, secure, efficient

M2MD Communications Gateway: fast, secure, efficient Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.

More information

Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices

Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Dr. Johann Heyszl, Head of Hardware Security Department Fraunhofer-Institute for Applied and Integrated Security

More information

HARDWARE SECURITY MODULES (HSMs)

HARDWARE SECURITY MODULES (HSMs) HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical

More information

Cybersecurity with Automated Certificate and Password Management for Surveillance

Cybersecurity with Automated Certificate and Password Management for Surveillance Cybersecurity with Automated Certificate and Password Management for Surveillance October 2017 ABSTRACT This reference architecture guide describes the reference architecture of a validated solution to

More information

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues

More information

IBG Protection for Anti-Fuse OTP Memory Security Breaches

IBG Protection for Anti-Fuse OTP Memory Security Breaches IBG Protection for Anti-Fuse OTP Memory Security Breaches Overview Anti-Fuse Memory IP is considered by some to be the gold standard for secure memory. Once programmed, reverse engineering methods will

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

A Multi-Application Smart-Card ID System for George Mason University. - Suraj Ravichandran.

A Multi-Application Smart-Card ID System for George Mason University. - Suraj Ravichandran. A Multi-Application Smart-Card ID System for George Mason University - Suraj Ravichandran. Current System Magnetic Swipe Card based ID The card has three tracks They each store the following: Name, G#

More information

Transforming Utility Grid Operations with the Internet of Things

Transforming Utility Grid Operations with the Internet of Things Solution Brief Internet of Things Energy Industry Transforming Utility Grid Operations with the Internet of Things Access key process data in real time to increase situational awareness of grid operations.

More information

Creating the Complete Trusted Computing Ecosystem:

Creating the Complete Trusted Computing Ecosystem: FEBRUARY 2018 Creating the Complete Trusted Computing Ecosystem: An Overview of the Trusted Software Stack (TSS) 2.0 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97003 Tel (503) 619-0562 Fax

More information

Market Trends and Challenges in Vehicle Security

Market Trends and Challenges in Vehicle Security Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Microcontrollers and Digital Networking Processors A Global Leader

More information

M2MD Communications Gateway: fast, secure and efficient

M2MD Communications Gateway: fast, secure and efficient Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular

More information

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium

More information

Trojan-tolerant Hardware

Trojan-tolerant Hardware Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis Doctoral Researcher, UCL Dan Cvrcek CEO, Enigma Bridge Who we are Vasilios Mavroudis Doctoral Researcher, UCL George Danezis

More information

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager Securing IoT devices with Hardware Secure Element Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager 2 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris

More information

#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication

More information

Cyber security mechanisms for connected vehicles

Cyber security mechanisms for connected vehicles Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset

In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset Seagate Secure Reliable Data Protection Solutions Always-on Data Protection

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

New Approaches to Connected Device Security

New Approaches to Connected Device Security New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information

Microsemi Secured Connectivity FPGAs

Microsemi Secured Connectivity FPGAs IoT Solutions Microsemi Secured Connectivity FPGAs SmartFusion2 SoC FPGAs Low Power Small Form Factors Scalable Security Secured Connectivity FPGAs Best in Class for IoT Infrastructure The IoT Infrastructure

More information

FeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc.

FeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc. FeliCa Approval for Security and Trust (FAST) Overview Introduction The security certification scheme called FeliCa Approval for Security and Trust (FAST) has been set up to enable the evaluation and certification

More information

The Identity-Based Encryption Advantage

The Identity-Based Encryption Advantage White Paper Security The Identity-Based Encryption Advantage Table of Contents page Introduction... 1 Six Requirements for Enterprise Key Management... 1 Traditional Approaches to Key Management... 2 Public

More information

Secure Application Trend in Smartphones. STMicroelectronics November 2017

Secure Application Trend in Smartphones. STMicroelectronics November 2017 Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

Hardware-Level Security for the IoT. Mark Zwolinski March 2017

Hardware-Level Security for the IoT. Mark Zwolinski March 2017 Hardware-Level Security for the IoT Mark Zwolinski March 2017 Outline Background, IoT, Hardware/Software, Threats/Risks Hardware-level security PUFs Anomaly detection Summary IoT / Embedded Systems Not

More information

Accelerating intelligence at the edge for embedded and IoT applications

Accelerating intelligence at the edge for embedded and IoT applications Accelerating intelligence at the edge for embedded and IoT applications Arm Tech Symposia 2017 Agenda The emergence of intelligence at the edge Requirements for intelligent edge computing IP and technologies

More information

MILITARY ANTI-TAMPERING SOLUTIONS USING PROGRAMMABLE LOGIC

MILITARY ANTI-TAMPERING SOLUTIONS USING PROGRAMMABLE LOGIC MILITARY ANTI-TAMPERING SOLUTIONS USING PROGRAMMABLE LOGIC Charlie Jenkins (Altera, San Jose, California, chjenkin@altera.com) Christian Plante (Altera, San Jose, California, cplante@altera.com) ABSTRACT

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

Network Security Protection Alternatives for the Cloud

Network Security Protection Alternatives for the Cloud A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances

More information

System-Level Failures in Security

System-Level Failures in Security System-Level Failures in Security Non linear offset component (ms) 0.0 0.5 1.0 1.5 2.0 Variable skew De noised Non linear offset Temperature 26.4 26.3 26.2 26.1 26.0 25.9 25.8 Temperature ( C) Fri 11:00

More information

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.

More information

A Developer's Guide to Security on Cortex-M based MCUs

A Developer's Guide to Security on Cortex-M based MCUs A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

The Next Generation of Credential Technology

The Next Generation of Credential Technology The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

Dyadic Security Enterprise Key Management

Dyadic Security Enterprise Key Management Dyadic Security Enterprise Key Management The Secure-as-Hardware Software with a Mathematical Proof Dyadic Enterprise Key Management (EKM) is the first software-only key management and key protection system

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

Accelerating the implementation of trusted computing

Accelerating the implementation of trusted computing Infineon Network Use Case Accelerating the implementation of trusted computing Building Confidence in Our Connected World with TPM middleware Products OPTIGA TPM www.infineon.com/ispn Use Case Use case

More information

The Cryptographic Sensor

The Cryptographic Sensor The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective

More information

Key Protection for Endpoint, Cloud and Data Center

Key Protection for Endpoint, Cloud and Data Center Key Protection for Endpoint, Cloud and Data Center ENCRYPTION IS ONLY AS SECURE AS ITS LEAST SECURE KEY Encryption is undoubtedly one of the pillars of information security. It is used everywhere today:

More information

Inside Secure accelerates strategy in Silicon IP business with SypherMedia acquisition

Inside Secure accelerates strategy in Silicon IP business with SypherMedia acquisition Inside Secure accelerates strategy in Silicon IP business with SypherMedia acquisition Amedeo D Angelo, President & CEO Richard Vacher Detournière, GM & CFO November 7, 2017 1 www.insidesecure.com Key

More information

CLOUD WORKLOAD SECURITY

CLOUD WORKLOAD SECURITY SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly

More information

Ezetap V3 Security policy

Ezetap V3 Security policy Ezetap V3 Security policy Page 1 Document changes Date Version Description 01 Feb 2015 Draft Initial document 08 Sep 2015 0.1 Added Key management 22 sep 2015 0.2 Specified security settings configuration

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Resilient IoT Security: The end of flat security models

Resilient IoT Security: The end of flat security models Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security

More information

Secure Device Manager for Intel Stratix 10 Devices Provides FPGA and SoC Security

Secure Device Manager for Intel Stratix 10 Devices Provides FPGA and SoC Security white paper FPGA Secure Device Manager for Intel Stratix 10 Devices Provides FPGA and SoC Security The Secure Device Manager for Intel Stratix 10 devices provides a failsafe, strongly authenticated, programmable

More information

Security Requirements for Crypto Devices

Security Requirements for Crypto Devices Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements

More information

Securing Smart Meters with MULTOS Technical Overview

Securing Smart Meters with MULTOS Technical Overview Securing Smart Meters with MULTOS Technical Overview Introduction This paper is written for those involved in the specification, procuring and design of smart metering infrastructure at a technical level.

More information

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin

Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions Topic Prerequisites Security concepts Security-related concepts (e.g., entropy) Virtualization

More information

Outline. Trusted Design in FPGAs. FPGA Architectures CLB CLB. CLB Wiring

Outline. Trusted Design in FPGAs. FPGA Architectures CLB CLB. CLB Wiring Outline Trusted Design in FPGAs Mohammad Tehranipoor ECE6095: Hardware Security & Trust University of Connecticut ECE Department Intro to FPGA Architecture FPGA Overview Manufacturing Flow FPGA Security

More information

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation 2017 Executive Summary (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation www.blockchainofthings.com Abstract The Internet of Things (IoT) is not secure and we

More information

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for

More information