What s In Your e-wallet? Using ARM IP to Enable Security in Mobile Phones. Richard Phelan Media Processing Division TrustZone Security Technology
|
|
- Cynthia Walker
- 5 years ago
- Views:
Transcription
1 What s In Your e-wallet? Using ARM IP to Enable Security in Mobile Phones Richard Phelan Media Processing Division TrustZone Security Technology 1
2 What s In Your Wallet Today? Some cards A bus ticket A match ticket Some receipts Some photos Some money 2
3 Photos Are Already on the Phone Convergence of mobile phone and digital camera technologies Mobile phone becoming the first choice for video and still photographs Always available Image quality continuously improving Better lenses Higher resolution image capture Increased capability display Storage capacity increasing with removable media Dramatically increases the number of photos you can carry with you 3
4 How About Money? A medium of exchange for: Goods s A unit of account Measurable A store of value Doesn t perish Provides market liquidity Will still be worth exchanging Credit is money you don t have yet Someone else s money Tickets and receipts are money you used to have Exchanged for good or services 4
5 The Utility Of Cards As Money Widely accepted form of payment MasterCard, Visa, Edy, FeliCa Well developed infrastructure Terminals for initiating payment Magnetic strip readers Smart cards Infrastructure for verifying payment Secure servers Well understood certification process To demonstrate the security of the card To show compliance with the specified functionality 5
6 The Secure Mobile Phone Utility It must be useful It must be easy to use Compatibility It must be usable with existing infrastructure Proliferation Many payment schemes must coexist Isolation Payment schemes must be isolated from each other Payment schemes must be hidden from the application software Security Secure storage of account information Secure access to card details But maybe not quite like this. 6
7 Potential Payment Channels Operator network payment Use the caller s identity to add payment to phone bill Mobile Internet Credit card details Bank details Near-field communications (NFC) Physical proximity to payment terminal 7
8 Potential Attack Vectors Bluetooth Infrared Wireless LAN MMS SMS or WAP link Instant message Memory card PC connection File download We need a secure mobile platform! 8
9 What is a Secure Mobile Platform? Hardware-level protection A solution complementary to existing security features Isolation of critical code Interoperability of applications Choice of security components Secure debug 9
10 What is a Secure Mobile Platform? Hardware-level protection A solution complementary to existing security features Isolation of critical code Interoperability of applications Choice of security components Secure debug 10
11 Example System Secure Secure Debug TrustZone Core Configurable L220 Non - Secure TZ Interrupt Controller (PL390) TZ Address Space Controller (PL380) GIC (PL390) TCM ETM ARMv6Z Core TCM L1 Cache L2 Cache RAM L2CC LCD Controller KMI AXI2APB SDRAM DMC (PL340) TZASC PL301 FLASH SMC (PL350) TZIMW On-Chip SRAM Boot ROM AXI2APB UART Watchdog RTC Timers AXI2APB SSP Sim I/F Sys Ctrl Unique ID AXI2APB Random Number Generator Key Storage Master Key TZ Protection Controller (BP147) DMA Crypto Engine TZ Internal Memory Wrapper (BP141) Timers AXI Interconnect (PL301) IEC TZPC 11
12 What is a Secure Mobile Platform? Hardware-level protection A solution complementary to existing security features Isolation of critical code Interoperability of applications Choice of security components Secure debug 12
13 Complementing Existing Solutions TrustZone Core apps Rich OS apps SIM IF Security Aware apps TrustZone API API / Library TrustZone Secure Channel Driver ISO 7816 SIM Card Baseband OEM Secure apps SD IF SIM binding Provider API Secure Channel Interface micro SD Card AMEX STIP Secure Manager Crypto HAL STIP API STIP Interpreter MegaSIM HAL NFC/SE IF Master Card STIP SE-Secure Controller VISA STIP Custom HAL NFC/SE IF Secures access to SIM card functions Establishes a secure channel between the payment service and the SIM card Allows sensitive bank information to be resident on the SIM Secures access to NFC subsystem NFC communications are hidden from the main applications environment Allows NFC usage to be authenticated by trusted code Secures access to removable storage Enables trusted scanners to check the integrity of the storage prior to use by the main applications NFC Host interface Integrated Modules, ICs NFC Antenna 13
14 What is a Secure Mobile Platform? Hardware-level protection A solution complementary to existing security features Isolation of critical code Interoperability of applications Choice of security components Secure debug 14
15 Isolation Of Critical Code System View TrustZone Application Application Secret Storage TrustZone API TrustZone API Operating System API Operating System API API API Secure Manager Secure Manager TrustZone TrustZone Device Device Driver Driver Security Security Device Device Driver Driver Rogue Rogue Device Device Driver Driver Secure Secure Channel Channel Interface Interface Hardware 15
16 What is a Secure Mobile Platform? Hardware-level protection A solution complementary to existing security features Isolation of critical code Interoperability of applications Choice of security components Secure debug 16
17 Interoperability of Applications Application OS Platform Secure service Agent TZ API TrustZone Hardware Platform Applications written for a particular Operating System and hardware platform use the same TrustZone API for differing: Operating Systems Hardware platforms Differing CPU cores Differing crypto hardware Differing secure memory configurations Implementations of the TrustZone secure world Differing third-party secure service, e.g. DRM 17
18 What is a Secure Mobile Platform? Hardware-level protection A solution complementary to existing security features Isolation of critical code Interoperability of applications Choice of security components Secure debug 18
19 Choice of Security Components System View Unmodified Embedded OS Application Application TrustZone API TrustZone API TrustZone TrustZone Device Device Driver Driver TrustZone Download Banking Banking Download Secure Manager Secure Manager Secure Secure Channel Channel Interface Interface Interpreted s Credit Credit Card Card STIP Interpreter STIP Interpreter Payment Payment #1 #1 NFC Device HAL NFC Device HAL H/W H/W Normal Normal Code Code Trusted Trusted Code Code Hardware 19
20 What is a Secure Mobile Platform? Hardware-level protection A solution complementary to existing security features Isolation of critical code Interoperability of applications Choice of security components Secure debug 20
21 TrustZone Software Debug SPIDEN enabled for secure services developers Debug Target hello Secure Developer hello ARM1176JZF-S TM processor-based SoC JTAG Port Normal World Audio Player OS Enable Secure World DRM Keys Decrypt Enable Application Developer 21
22 Secure User Interface & Communication NFC and mobile banking will require secure user interface and keypad in second-generation NFC devices Complex user interface generated from application processor, with bank keys residing on SIM Secure link between SIM and application processor Secure applications require isolation from each other STIP is accepted standard isolation in payment terminals STIP enables pluggable applications Not possible for payment companies to verify every model of handset TrustZone provides the opportunity for classification of devices 22
23 The Complete e-wallet TrustZone Core apps apps Security Aware apps OEM Secure apps SIM binding AMEX STIP Master Card STIP STIP API VISA STIP Secure user interface with key pad input and display, controlled from secure TrustZone environment Secure applications sandboxed by the TrustZone Software STIP interpreter Secure channel established between STIPlet and SIM card, permitting sensitive bank keys to be resident on SIM card Sensitive bank keys and applications can reside on SIM card with a secure channel established to a STIPlet STIP Interpreter Rich OS TrustZone API API / Library TrustZone Secure Channel Driver Provider API Secure Channel Interface Secure Manager Crypto HAL MegaSIM HAL Custom HAL NFC/SE IF SIM IF SIM Card ISO 7816 Baseband NFC Host Interface SD IF micro SD Card NFC Antenna NFC/SE IF SE-Secure Controller Integrated Modules, ICs 23
ARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationSecuring the System with TrustZone Ready Program Securing your Digital World. Secure Services Division
Securing the System with TrustZone Ready Program Securing your Digital World Secure Services Division 1 ARM Secure Services Division Established in Q4 2010 To enable a market for secure applications and
More informationTrusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague
Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations
More informationBeyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop
Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland
More informationSecure Elements 101. Sree Swaminathan Director Product Development, First Data
Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases
More informationGSM Association (GSMA) Mobile Ticketing Initiative
GSM Association (GSMA) Mobile Ticketing Initiative Sue Monahan Director - GSMA NA Clif Campbell Lead Member of Technical Staff AT&T April 2010 Content GSM World Today GSMA Overview GSMA M-Ticketing Initiative
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Senior Technical Marketing Manager Shenzhen / ARM Tech Forum / The Ritz-Carlton June 14, 2016 Agenda Introduction Security Foundations on Cortex-A
More informationModule Introduction. CONTENT: - 8 pages - 1 question. LEARNING TIME: - 15 minutes
Module Introduction PURPOSE: The intent of this module is to introduce a series of modules that explain important features of Motorola s i.mx applications processors. OBJECTIVES: - Explain the need for
More informationZatara Series ARM ASSP High-Performance 32-bit Solution for Secure Transactions
1 ARM-BASED ASSP FOR SECURE TRANSACTIONS ZATARA SERIES 32-BIT ARM ASSP PB022106-1008 ZATARA SERIES ADVANTAGE SINGLE-CHIP SOLUTION BEST FEATURE SET IN POS PCIPED PRE-CERTIFIED EMV L1 CERTIFIED TOTAL SOLUTION
More informationDesigning, developing, debugging ARM Cortex-A and Cortex-M heterogeneous multi-processor systems
Designing, developing, debugging ARM and heterogeneous multi-processor systems Kinjal Dave Senior Product Manager, ARM ARM Tech Symposia India December 7 th 2016 Topics Introduction System design Software
More informationGlobalPlatform Trusted Execution Environment (TEE) for Mobile
GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationThe Next Steps in the Evolution of Embedded Processors
The Next Steps in the Evolution of Embedded Processors Terry Kim Staff FAE, ARM Korea ARM Tech Forum Singapore July 12 th 2017 Cortex-M Processors Serving Connected Applications Energy grid Automotive
More informationCoreTile Express for Cortex-A5
CoreTile Express for Cortex-A5 For the Versatile Express Family The Versatile Express family development boards provide an excellent environment for prototyping the next generation of system-on-chip designs.
More informationARM s IP and OSCI TLM 2.0
ARM s IP and OSCI TLM 2.0 Deploying Implementations of IP at the Programmer s View abstraction level via RealView System Generator ESL Marketing and Engineering System Design Division ARM Q108 1 Contents
More informationOP-TEE Using TrustZone to Protect Our Own Secrets
OP-TEE Using TrustZone to Protect Our Own Secrets ROM-Code Bootloader OP-TEE Kernel Root File System ELC Europe 2017, 23.10.2017 Marc Kleine-Budde Slide 1 - http://www.pengutronix.de
More informationFujitsu System Applications Support. Fujitsu Microelectronics America, Inc. 02/02
Fujitsu System Applications Support 1 Overview System Applications Support SOC Application Development Lab Multimedia VoIP Wireless Bluetooth Processors, DSP and Peripherals ARM Reference Platform 2 SOC
More informationSmart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017
Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software
More informationAdvanced Embedded Systems
Advanced Embedded Systems Practical & Professional Training on Advanced Embedded System Course Objectives : 1. To provide professional and industrial standard training which will help the students to get
More informationSmart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen
Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology Smart Card Alliance2005 Fall Annual Conference Martin Bührlen Agenda NFC Technology Use Cases Implications for the
More informationTrustzone Security IP for IoT
Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday
More informationeh880 Secure Smart Card Terminal
eh880 Secure Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1. MCU Cards...
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationHigh-Performance, Highly Secure Networking for Industrial and IoT Applications
High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications
More informationNFC is the double click in the internet of the things
NFC is the double click in the internet of the things Name Frank Graeber, Product Manager NFC Subject 3rd Workshop on RFID Systems and Technologies Date 12.06.2007 Content NFC Introduction NFC Technology
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Copyright 2016 [ARM Inc.] Outline Wearable & IoT Market Opportunity Challenges in Wearables & IoT Market ARM technology tackles
More informationEmbedded Linux With Raspberry Pi IOT
Embedded Linux With Raspberry Pi IOT Module 1 : Raspberry Pi Set up & Configurations Program Raspberry Pi : a credit-card sized computer Python programming for Raspberry Pi Interacting and configuring
More informationSecure Application Trend in Smartphones. STMicroelectronics November 2017
Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research
More informationNFC embedded microsd smart Card - Mobile ticketing opportunities in Transit
NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical
More informationFundamentals of HW-based Security
Fundamentals of HW-based Security Udi Maor CryptoCell-7xx Product Manager Systems and SW Group ARM Tech Forum 2016 - Korea Jun. 28, 2016 What is system security design? Every system design will require
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Ivan H. P. Lin ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables &
More informationDie Zukunft des M-Payment The future of m-payment NFC. Andreas Johne. Düsseldorf, 25. Januar 2008
Die Zukunft des M-Payment Düsseldorf, 25. Januar 2008 Andreas Johne Agenda Brief company presentation M-payment with Near Field Communication Success stories with Page 2 Giesecke & Devrient From Printing
More informationEffective System Design with ARM System IP
Effective System Design with ARM System IP Mentor Technical Forum 2009 Serge Poublan Product Marketing Manager ARM 1 Higher level of integration WiFi Platform OS Graphic 13 days standby Bluetooth MP3 Camera
More informationHow to protect Automotive systems with ARM Security Architecture
How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked
More informationThe Use Of Virtual Platforms In MP-SoC Design. Eshel Haritan, VP Engineering CoWare Inc. MPSoC 2006
The Use Of Virtual Platforms In MP-SoC Design Eshel Haritan, VP Engineering CoWare Inc. MPSoC 2006 1 MPSoC Is MP SoC design happening? Why? Consumer Electronics Complexity Cost of ASIC Increased SW Content
More informationAdvances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards. contactless IC cards that is being adopted
Type A/B GP TSM Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards The Osaifu-Keitai service currently being provided in Japan is based on the FeliCa *1 mobile
More informationEmbedded System Security Mobile Hardware Platform Security
1 Embedded System Security Mobile Hardware Platform Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2017 Acknowledgement This slide set
More informationDesigning with ALTERA SoC Hardware
Designing with ALTERA SoC Hardware Course Description This course provides all theoretical and practical know-how to design ALTERA SoC devices under Quartus II software. The course combines 60% theory
More informationConnect your IoT device: Bluetooth 5, , NB-IoT
Connect your IoT device: Bluetooth 5, 802.15.4, NB-IoT Prithi Ramakrishnan Arm TechTalk 2017 IoT connectivity technologies Multiple standards, different applications Throughput Unlicensed >100Mbps Wi-Fi
More informationLeveraging the full potential of NFC to reinvent physical access control. Friday seminar,
Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses
More informationEmbedded System Security Mobile Hardware Platform Security
1 Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2016 Acknowledgement This slide set is based on slides provided by
More informationBeyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited
Beyond TrustZone PSA Rob Coombs Security Director Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security analyses Summary
More informationManaging an NFC Ecosystem
Managing an NFC Ecosystem Gerald Madlmayr NFC, ICMB 2008, Barcelona 1 NFC - What is it all about RFID Derivate 13,56 Mhz Integrated in mobile devices for consumer market Operating Modes Tag/SmartCard Emulation
More informationWHITE PAPER 2019 AUTHENTICATOR WHITE PAPER
WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER 1 The Background to the WIZZIT Authenticator THE EVOLUTION OF AUTHENTICATION At its most basic level, bank grade authentication is built around a simple concept
More informationPower on/off Button. Secure PIN Pad. Mswipe Technologies Pvt. Ltd.
WisePOS is an innovative Android Mobile MPOS device accepting different forms of payment including EMV Chip & Pin, MSR and NFC contactless. Integrated with BT, Wi, GPRS and optional barcode scanner, WisePOS
More informationARMed for Automotive. Table of Contents. SHARP and ARM Automotive Segments SHARP Target Applications SHARP Devices SHARP Support Network Summary
ARMed for Automotive Gunter Wagschal Table of Contents SHARP and ARM Automotive Segments SHARP Target Applications SHARP Devices SHARP Support Network Summary 1 SHARP and ARM 1993 - SHARP becomes the third
More informationIntelop. *As new IP blocks become available, please contact the factory for the latest updated info.
A FPGA based development platform as part of an EDK is available to target intelop provided IPs or other standard IPs. The platform with Virtex-4 FX12 Evaluation Kit provides a complete hardware environment
More informationConnect Your IoT Device: Bluetooth 5, , NB-IoT
Connect Your IoT Device: Bluetooth 5, 802.15.4, NB-IoT Craig Tou Business Development Manager, Arm Arm Tech Symposia 2017, Taipei IoT Devices - Everything Connects New classes of connectivity for a new
More informationFacing the Reality: Virtualization in a Microkernelbased Operating System. Matthias Lange, MOS, January 26th, 2016
Facing the Reality: Virtualization in a Microkernelbased Operating System Matthias Lange, MOS, January 26th, 2016 matthias.lange@kernkonzept.com Today's take aways Microkernel systems are used to build
More informationRelay Attacks on Secure Elementenabled
Relay Attacks on Secure Elementenabled Mobile Devices Virtual Pickpocketing Revisited Michael Roland University of Applied Sciences Upper Austria,, Austria SEC2012 IFIP International Information Security
More informationCopyright 2016 Xilinx
Zynq Architecture Zynq Vivado 2015.4 Version This material exempt per Department of Commerce license exception TSU Objectives After completing this module, you will be able to: Identify the basic building
More informationEmbedded Systems: Architecture
Embedded Systems: Architecture Jinkyu Jeong (Jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu ICE3028: Embedded Systems Design, Fall 2018, Jinkyu Jeong (jinkyu@skku.edu)
More informationSAM A5 ARM Cortex - A5 MPUs
SAM A5 ARM Cortex - A5 MPUs Industry s lowest-power MPUs Ideal for secure industry, IoT, wearable applications Operating at 600MHz/945DMIPS with low power consumption, the SAMA5 ARM Cortex-A5 based MPU
More informationCannon Mountain Dr Longmont, CO LS6410 Hardware Design Perspective
LS6410 Hardware Design Perspective 1. S3C6410 Introduction The S3C6410X is a 16/32-bit RISC microprocessor, which is designed to provide a cost-effective, lowpower capabilities, high performance Application
More informationImplementation of ATM security using IOT
Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering
More informatione-pg Pathshala Subject: Computer Science Paper: Embedded System Module: Embedded System Design Case Study-Part I Module No: CS/ES/39 Quadrant 1 e-text
e-pg Pathshala Subject: Computer Science Paper: Embedded System Module: Embedded System Design Case Study-Part I Module No: CS/ES/39 Quadrant 1 e-text In this lecture, the design and the basic concepts
More informationIFX Day Secure Mobile Solutions. Dominik Bilo CMO Secure Mobile Solutions Business Group. November 16, Munich. IFX Day 2004.
November 16, 2004 - Munich Secure Mobile Solutions Slide 1 Dominik Bilo CMO Secure Mobile Solutions Business Group Disclaimer Please note that while you are reviewing this information, this presentation
More informationARM Server s Firmware Security
presented by ARM Server s Firmware Security Spring 2017 UEFI Seminar and Plugfest March 27-31, 2017 Presented by Zhixiong (Jonathan) Zhang (Cavium, Inc.) Updated 2011-06- 01 UEFI Plugfest March 2017 www.uefi.org
More informationPutting It (almost) all Together: ios Security. Konstantin Beznosov
Putting It (almost) all Together: ios Security Konstantin Beznosov BSD based OS Chain of trust during boot Secure Enclave Effaceable Storage (Secure deletion) Touch Id (Usable authentication) Per file
More informationEmerging Financial Payment Applications Powered by Freescale Security Solutions
Emerging Financial Payment Applications Powered by Freescale Security Solutions FTF-CON-F0484 Starle Li Marketing Manager, AP M A Y. 2 0 1 4 TM External Use Agenda Explosive Growth of China POS Industry
More informationFault tolerance in consumer products. Ben Pronk
Fault tolerance in consumer products Ben Pronk Content Consumer electronics, some background Reliability and software in consumer products Current solutions Future outllok 2 Consumer electronics, some
More informationHotChips An innovative HD video and digital image processor for low-cost digital entertainment products. Deepu Talla.
HotChips 2007 An innovative HD video and digital image processor for low-cost digital entertainment products Deepu Talla Texas Instruments 1 Salient features of the SoC HD video encode and decode using
More informationProduct Technical Brief S3C2413 Rev 2.2, Apr. 2006
Product Technical Brief Rev 2.2, Apr. 2006 Overview SAMSUNG's is a Derivative product of S3C2410A. is designed to provide hand-held devices and general applications with cost-effective, low-power, and
More informationSoftware Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on
More informationSecuring Multiple Mobile Platforms
Securing Multiple Mobile Platforms CPU-based Multi Factor Security 2010 Security Workshop ETSI 2010 Security Workshop Navin Govind Aventyn, Inc. Founder and CEO 1 Mobile Platform Security Gaps Software
More informationAge nda. Intel PXA27x Processor Family: An Applications Processor for Phone and PDA applications
Intel PXA27x Processor Family: An Applications Processor for Phone and PDA applications N.C. Paver PhD Architect Intel Corporation Hot Chips 16 August 2004 Age nda Overview of the Intel PXA27X processor
More informationSBC3100 (Cortex-A72) Single Board Computer
(Cortex-A72) Single Board Computer Ultra High Performance SBC with RK3399 (Cortex-A72 x2 + Cortex-A53 x4) @ 2Ghz : Single Board Computer H310: Input (receiver) Module : Output (display) Module D120: 4xCOM
More informationCh 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated
Ch 9: Mobile Payments CNIT 128: Hacking Mobile Devices Updated 4-24-17 Current Generation Scenarios Mobile banking apps NFC-based or barcode-based payment apps used by consumers to purchase goods Premium-rated
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationDate: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.
Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationTailoring TrustZone as SMM Equivalent
presented by Tailoring TrustZone as SMM Equivalent Tony C.S. Lo Senior Manager American Megatrends Inc. UEFI Plugfest March 2016 www.uefi.org 1 Agenda Introduction ARM TrustZone SMM-Like Services in TrustZone
More informationGrowth outside Cell Phone Applications
ARM Introduction Growth outside Cell Phone Applications ~1B units shipped into non-mobile applications Embedded segment now accounts for 13% of ARM shipments Automotive, microcontroller and smartcards
More informationProduct names and symbols mentioned in this presentation and this document content are trademarks or registered trademarks owned by respective companies. We highlight them here for educational purpose
More informationA Methodology for NoC
OCCN On-Chip Communication Architecture OccN A Methodology for NoC AST Grenoble Marcello Coppola Outline SoC today NoC OCCN Case study Conclusion Soc Today: A Variety of Networks & Terminals Ad-Hoc-Net
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Daniel Heo ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables & IoT
More informationSPS-700B USER MANUAL
SPS-700B USER MANUAL 1 PIM CONSTRUCTION Page: 2 / 11 2 SPECIFICATIONS Category Specifications CPU Memory SAMSUNG Arm11 667MHz RAM NAND Flash SDRAM 128M Byte 2G Byte RTC DISPLAY Real Time Clock With Back-up
More informationMarket Trends and Challenges in Vehicle Security
Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Microcontrollers and Digital Networking Processors A Global Leader
More informationProduct Technical Brief S3C2412 Rev 2.2, Apr. 2006
Product Technical Brief S3C2412 Rev 2.2, Apr. 2006 Overview SAMSUNG's S3C2412 is a Derivative product of S3C2410A. S3C2412 is designed to provide hand-held devices and general applications with cost-effective,
More informationSoftware Defined Modem A commercial platform for wireless handsets
Software Defined Modem A commercial platform for wireless handsets Charles F Sturman VP Marketing June 22 nd ~ 24 th Brussels charles.stuman@cognovo.com www.cognovo.com Agenda SDM Separating hardware from
More informationACR880 GPRS Portable Smart Card Terminal
ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.
More informationARM TrustZone for ARMv8-M for software engineers
ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,
More informationMobile Prepaid: The Future is Now. Mary Carol Harris Visa Europe
Mobile Prepaid: The Future is Now Mary Carol Harris Mobile in context 4.8 billion 3.5 billion 1000 every minute Youth have never known life without a phone Payment via mobile phone discussed spontaneously
More informationHugo Cunha. Senior Firmware Developer Globaltronics
Hugo Cunha Senior Firmware Developer Globaltronics NB-IoT Product Acceleration Platforms 2018 Speaker Hugo Cunha Project Developper Agenda About us NB IoT Platforms The WIIPIIDO The Gateway FE 1 About
More informationProduct Technical Brief S3C2440X Series Rev 2.0, Oct. 2003
Product Technical Brief S3C2440X Series Rev 2.0, Oct. 2003 S3C2440X is a derivative product of Samsung s S3C24XXX family of microprocessors for mobile communication market. The S3C2440X s main enhancement
More informationLive Demo: A New Hardware- Based Approach to Secure the Internet of Things
SESSION ID: CCS-W04 Live Demo: A New Hardware- Based Approach to Secure the Internet of Things Cesare Garlati Chief Security Strategist prpl Foundation @CesareGarlati Securing the Internet of (broken)
More informationFare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010
Fare Media: Past, Present and Future Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Evolution of Transit Fare Media Other Form Factors (contactless tokens and tags,
More informationWebinar Tokenization 101
Webinar Tokenization 101 René M. Pelegero Retail Payments Global Consulting Group L.L.C December 15 th, 2014 Webinar Overview A description of tokenization and how the technology is being employed in the
More informationPerformance Optimization for an ARM Cortex-A53 System Using Software Workloads and Cycle Accurate Models. Jason Andrews
Performance Optimization for an ARM Cortex-A53 System Using Software Workloads and Cycle Accurate Models Jason Andrews Agenda System Performance Analysis IP Configuration System Creation Methodology: Create,
More informationSIERRAWARE SIERRATEE FOR MIPS OMNISHIELD
SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD Introduction SierraTEE for MIPS OmniShield is a Global Platform compliant Trusted Execution Environment (TEE) designed for devices based on Imagination Technologies'
More informationEsto. An Eclipse-Based Embedded S/W Development Tool. Heung-Nam Kim Director of Embedded S/W Technology Center
Esto An Eclipse-Based Embedded S/W Development Tool Heung-Nam Kim hnkim@etri.re.kr Director of Embedded S/W Technology Center 1 Embedded S/W Technology Center Outlines! About ETRI! Embedded S/W Technology
More informationPRODUCT PREVIEW TNETV1050 IP PHONE PROCESSOR. description
C55x DSP Operating at 125 MHz, Providing up to 250 MIPS MIPS32 4KEc 32-Bit RISC Processor, Operating at 165 MHz, Providing up to 223 Dhrystone MIPS On-Chip Peripherals Include: External Memory Interface
More informationCirrus Logic Announces New ARM9-Based Embedded Processor Family Press Presentation February 2004
Cirrus Logic Announces New ARM9-Based Embedded Processor Family Press Presentation February 2004 Cirrus provides the most comprehensive selection of ARM9- based embedded processors, with a wide variety
More informationThe Software of Things T Y S O N T U T T L E C E O S I L I C O N L A B S A S P E N C O R E C E O S U M M I T S H E N Z H E N 8 N O V E M B E R 2018
The Software of Things T Y S O N T U T T L E C E O S I L I C O N L A B S A S P E N C O R E C E O S U M M I T S H E N Z H E N 8 N O V E M B E R 2018 Most technology we ve built so far was for the Internet
More informationPractical Attack Scenarios on Secure Element-enabled Mobile Devices
Practical Attack Scenarios on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria 4 th International Workshop on Near Field Communication 13 March
More information. SMARC 2.0 Compliant
MSC SM2S-IMX8 NXP i.mx8 ARM Cortex -A72/A53 Description The new MSC SM2S-IMX8 module offers a quantum leap in terms of computing and graphics performance. It integrates the currently most powerful i.mx8
More informationTrustworthy Execution on Mobile Devices: What security properties can my mobile platform give me?
Trustworthy Execution on Mobile Devices: What security properties can my mobile platform give me? Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou James Newsome, and Jonathan McCune November 16, 2011 CMU-CyLab-11-023
More informationLecture 5: Computing Platforms. Asbjørn Djupdal ARM Norway, IDI NTNU 2013 TDT
1 Lecture 5: Computing Platforms Asbjørn Djupdal ARM Norway, IDI NTNU 2013 2 Lecture overview Bus based systems Timing diagrams Bus protocols Various busses Basic I/O devices RAM Custom logic FPGA Debug
More information