How to protect Automotive systems with ARM Security Architecture
|
|
- Cassandra Rose
- 5 years ago
- Views:
Transcription
1 How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car
2 Successful products will be attacked Attack surface is ever expanding More networked MCUs are interacting Cars are becoming more vulnerable: Greater computer interaction with steering, brakes Remote wireless connectivity and remote interaction Bridges to Controller Area Network (CAN) 2 Attackers have the privilege of selecting where to attack Security researchers willing to spend years on high profile attacks Since these remote attacks will necessarily be multi-stage, we recommend a defense in depth strategy Survey of remote automotive attack surfaces: Miller & Valasek
3 Connected to the Internet & CAN 3
4 Security principles for automotive Lifecycle Security non-trusted Communications Security trusted Device Security Crypto Root of Trust trusted software trusted hardware secure system secure storage 4
5 Layers of security to protect your system Cost/Effort To Attack Trusted Execution Environment (TEE) Security Subsystem & HSM Secure Element Transport Layer Security (TLS) SW & HW Attacks Physical access to device JTAG, Bus, IO Pins, Time, money & equipment. Software Attacks Buffer overflows Interrupts Malware Communication Attacks Man In The Middle Weak RNG (Random Number Generator) Code vulnerabilities 5 Cost/Effort to Secure H S M = Hardware Security Module
6 Layers of security to protect your system Cost/Effort To Attack TrustZone TEE or SPM* CryptoCell SecurCore mbed TLS SW & HW Attacks Physical access to device JTAG, Bus, IO Pins, Time, money & equipment. Communication Attacks Man In The Middle Weak RNG Code vulnerabilities Software Attacks Buffer overflows Interrupts Malware 6 Cost/Effort to Secure * SPM = Secure Partitioning Manager
7 Establishing trust and integrity based on hardware Apps OS/RTOS Trusted Software TrustZone SPM or TEE irot TrustZone CryptoCell Keys RTOS Trusted Apps/Libs Extended Root of Trust e.g. TrustZone based Secure Partitioning Manager or TEE Initial Root of Trust: Dependable Security functions Provisioned keys/certs 7
8 Ideally a RoT lives in a isolated security subsystem Security Subsystem Security subsystem Highly evaluated code developed by security specialists & built in by silicon vendor 8
9 and provides trustworthy services to a hardware isolated TEE (TCB) Normal World IoT developer writes Apps On top of his/her chosen RTOS Secure World = Trusted code (mostly libs) Provided by MDK, IoT platform or ISV + Trusted hardware TrustZone Security Subsystem Security subsystem Implemented as Trusted Peripheral Highly evaluated code developed by security specialists & built in by silicon vendor 9
10 ARM TrustZone Technology in 3 Steps 1. Define secure hardware architecture Two separate domains: normal and secure Extends across system Processor, interrupts, peripherals, memory, key storage, counters 2. Implement in silicon System on Chip (SoC) Enforcing secure/normal separation in hardware 3. Combine SoC with Trusted Software Trusted Boot & Firmware Trusted OS / Secure Partitioning Manager Result: A Trusted Execution Environment (TEE) Ready to develop and deploy trusted services CPU CPU NORMAL SECURE Rich OS Trusted OS Trusted Execution Environment 10
11 Security on Apps processors (e.g.ivi): Defence in depth Normal World Code Trusted Software Apps EL0 EL1 EL2 Apps/User Comms Stack Device Drivers Rich OS Hypervisor FIDO Trusted_Apps Integrity Secure Device Drivers Trusted OS GlobalPlatform Standardisation TrustZone based TEE EL3 SMCCC PSCI Trusted Boot Payload Dispatcher Trusted Firmware Hardware Interfaces ARM Cortex-A SoC System Physical IP CryptoCell Security Services Platform Initial ROT & Security subsystem 11
12 SW platforms require security functions Graphics By Genivi Cooperation 12
13 Security functions are mapped to security layers Normal World Code Trusted Software Apps EL0 Apps/User Comms Stack FOTA Anomaly Trusted_Apps EL1 Device Drivers Rich OS Secure Device Drivers Trusted OS EL2 Hypervisor Anomaly EL3 SMCCC PSCI Trusted Boot Payload Dispatcher Crypto Hardware Interfaces HSM ARM Cortex-A SoC System Physical IP CryptoCell Security Services Platform 13
14 Example: Strong Authentication via FIDO* Only allow authenticated users to interact No passwords or secrets for the user TrustZone based TEE can protect integrity/crypto on FIDO server in car TrustZone based TEE can protect private keys/crypto and FPS on phone Challenge FIDO Server User verification FIDO Authentication TLS secure channel 14 User gesture e.g. FP Before key can be used * Signed Response
15 Example: Movies & TrustZone Media Protection TrustZone Protected container Protected container Decryption keys Plaintext compressed video stream Working memory Plaintext uncompressed video stream Working memory Frame buffer TrustZone CryptoCell Mali V550 Mali T8xx Mali DP550 Crypto VPU GPU Display Encrypted compressed video stream Non-trusted container UI content Shader programs
16 Next generation TrustZone enabled MCUs TrustZone for ARMv8-M Normal World Code Trusted Software Unprivileged Apps/User Comms Stack Crypto CAN Monitor Trusted Libs TLS/Crypto Libs CMSIS API Privileged RTOS Device Drivers SPM Platform Code TrustZone based Secure Partitioning Manager Hardware Interfaces ARM Cortex -M v8-m Microcontroller Physical IP CryptoCell Security Services Platform Initial ROT & Security subsystem 16
17 Practical steps for designing-in security today Build in layers of hardware based security Unique keys / identities Security subsystems or HSMs TrustZone based TEE or TrustZone based SPM Secure/authenticated debug CAN gateways for isolation and anomaly detection Consider advanced authentication such as FIDO (no passwords) Use end to end encryption TLS for Internet Enable secure OTA updates Have your system/platform penetration tested (e.g. whitebox testing) 17
18 Security Summary The automotive attack surface is expanding with the spread of connected MCU s & at the same time vulnerability is increasing due to the growing autonomous nature of cars Defence in depth is needed TrustZone and CryptoCell provide layers of hardware based security ARM is helping by supplying security architecture, subsystems, TrustZone system IP and open source software to the partnership ARM is accelerating investment in security solutions and OSS 18
19 Thank you! The trademarks featured in this presentation are registered and/or unregistered trademarks of ARM Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be trademarks of their respective owners. Copyright 2015 ARM Limited
Trustzone Security IP for IoT
Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Senior Technical Marketing Manager Shenzhen / ARM Tech Forum / The Ritz-Carlton June 14, 2016 Agenda Introduction Security Foundations on Cortex-A
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations
More informationBeyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop
Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland
More informationBeyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited
Beyond TrustZone PSA Rob Coombs Security Director Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security analyses Summary
More informationBeyond TrustZone Part 1 - PSA
Beyond TrustZone Part 1 - PSA Rob Coombs Security Director, Arm Arm Tech Symposia 2017, Hsinchu Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationTrusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague
Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims
More informationFundamentals of HW-based Security
Fundamentals of HW-based Security Udi Maor CryptoCell-7xx Product Manager Systems and SW Group ARM Tech Forum 2016 - Korea Jun. 28, 2016 What is system security design? Every system design will require
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationThe Next Steps in the Evolution of Embedded Processors
The Next Steps in the Evolution of Embedded Processors Terry Kim Staff FAE, ARM Korea ARM Tech Forum Singapore July 12 th 2017 Cortex-M Processors Serving Connected Applications Energy grid Automotive
More informationARM TrustZone for ARMv8-M for software engineers
ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,
More informationARM processors driving automotive innovation
ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Daniel Heo ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables & IoT
More informationARM mbed Technical Overview
ARM mbed Technical Overview Byungdoo Choi ARM IoTBU FAE Korea June 2017 ARM 2017 ARM knows the world of connected devices >95% market share >85% market share >90% market share >90% market share smartphone
More informationInnovation is Thriving in Semiconductors
Innovation is Thriving in Semiconductors Mike Muller Chief Technology Officer ARM TechCon Nov 10, 2015 BBC Model B ARM1 ARM Holdings Cortex-M0 BBC micro:bit 1981 1985 1990 2015 Core Tech Transisto r Design
More informationDesigning, developing, debugging ARM Cortex-A and Cortex-M heterogeneous multi-processor systems
Designing, developing, debugging ARM and heterogeneous multi-processor systems Kinjal Dave Senior Product Manager, ARM ARM Tech Symposia India December 7 th 2016 Topics Introduction System design Software
More informationResilient IoT Security: The end of flat security models. Milosch Meriac IoT Security Engineer
Resilient IoT Security: The end of flat security models Milosch Meriac IoT Security Engineer milosch.meriac@arm.com Securing a computer system has traditionally been a battle of wits: the penetrator tries
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Copyright 2016 [ARM Inc.] Outline Wearable & IoT Market Opportunity Challenges in Wearables & IoT Market ARM technology tackles
More informationBuilding mbed Together: An Overview of mbed OS and How To Get Involved
Building mbed Together: An Overview of mbed OS and How To Get Involved Hugo Vincent / Product Lead mbed OS, Paul Bakker / Product Strategy, mbed IoT Device Platform mbed Sponsored Session/ ARM Tech Con
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Ivan H. P. Lin ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables &
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon
More informationARM instruction sets and CPUs for wide-ranging applications
ARM instruction sets and CPUs for wide-ranging applications Chris Turner Director, CPU technology marketing ARM Tech Forum Taipei July 4 th 2017 ARM computing is everywhere #1 shipping GPU in the world
More informationArm TrustZone Armv8-M Primer
Arm TrustZone Armv8-M Primer Odin Shen Staff FAE Arm Arm Techcon 2017 Security Security technologies review Application Level Security Designed with security in mind: authentication and encryption Privilege
More informationIoT and Security: ARM v8-m Architecture. Robert Boys Product Marketing DSG, ARM. Spring 2017: V 3.1
IoT and Security: ARM v8-m Architecture Robert Boys Product Marketing DSG, ARM Spring 2017: V 3.1 ARM v8-m Trustzone. Need to add security to Cortex -M processors. IoT Cortex-A has had TrustZone for a
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Paul Bakker Product Strategy, IoT BU ARM Tech Symposia China 2015 November 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon Last Year 60K 2014
More informationThe Next Steps in the Evolution of ARM Cortex-M
The Next Steps in the Evolution of ARM Cortex-M Joseph Yiu Senior Embedded Technology Manager CPU Group ARM Tech Symposia China 2015 November 2015 Trust & Device Integrity from Sensor to Server 2 ARM 2015
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationImplementing Secure Software Systems on ARMv8-M Microcontrollers
Implementing Secure Software Systems on ARMv8-M Microcontrollers Chris Shore, ARM TrustZone: A comprehensive security foundation Non-trusted Trusted Security separation with TrustZone Isolate trusted resources
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Dr.Krisztián Flautner General Manager / ARM Internet of Things Business Unit ARM Holdings Ltd mbed Sponsored Session / ARM TechCon 2015 11 th Nov 2015 Productivity Security
More informationARM mbed Technical Overview
ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application
More informationDelivering High-mix, High-volume Secure Manufacturing in the Distribution Channel
Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1
More informationA Secure and Connected Intelligent Future. Ian Smythe Senior Director Marketing, Client Business Arm Tech Symposia 2017
A Secure and Connected Intelligent Future 1 2017 Arm Copyright Limited Arm 2017 Ian Smythe Senior Director Marketing, Client Business Arm Tech Symposia 2017 Arm: The Industry s Architecture of Choice 50
More informationOptimizing Cache Coherent Subsystem Architecture for Heterogeneous Multicore SoCs
Optimizing Cache Coherent Subsystem Architecture for Heterogeneous Multicore SoCs Niu Feng Technical Specialist, ARM Tech Symposia 2016 Agenda Introduction Challenges: Optimizing cache coherent subsystem
More information#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication
More informationTailoring TrustZone as SMM Equivalent
presented by Tailoring TrustZone as SMM Equivalent Tony C.S. Lo Senior Manager American Megatrends Inc. UEFI Plugfest March 2016 www.uefi.org 1 Agenda Introduction ARM TrustZone SMM-Like Services in TrustZone
More informationHW isolation for automotive environment BoF
HW isolation for automotive environment BoF Michele Paolino m.paolino@virtualopensystems.com AGL All Member Meeting 2016, 2016-09-07, Munich, Germany http://www.tapps-project.eu/ Authorship and sponsorship
More informationSIERRAWARE SIERRATEE FOR MIPS OMNISHIELD
SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD Introduction SierraTEE for MIPS OmniShield is a Global Platform compliant Trusted Execution Environment (TEE) designed for devices based on Imagination Technologies'
More informationOP-TEE Using TrustZone to Protect Our Own Secrets
OP-TEE Using TrustZone to Protect Our Own Secrets ROM-Code Bootloader OP-TEE Kernel Root File System ELC Europe 2017, 23.10.2017 Marc Kleine-Budde Slide 1 - http://www.pengutronix.de
More informationThe Changing Face of Edge Compute
The Changing Face of Edge Compute 2018 Arm Limited Alvin Yang Nov 2018 Market trends acceleration of technology deployment 26 years 4 years 100 billion chips shipped 100 billion chips shipped 1 Trillion
More informationARM mbed Towards Secure, Scalable, Efficient IoT of Scale
ARM mbed Towards Secure, Scalable, Efficient IoT of Scale Kirsi Maansaari Product Manager, ARM Copenhagen/Embedded Everywhere 2016 Faster route to secure IoT from chip to cloud Announced at ARM TechCon
More informationPractical real-time operating system security for the masses
Practical real-time operating system security for the masses Milosch Meriac Principal Security Engineer github.com/armmbed/uvisor ARM TechCon 25 th October 2016 Why is microcontroller security so hard?
More informationSecurity and Performance Benefits of Virtualization
Security and Performance Benefits of Virtualization Felix Baum mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered
More informationSecuring the System with TrustZone Ready Program Securing your Digital World. Secure Services Division
Securing the System with TrustZone Ready Program Securing your Digital World Secure Services Division 1 ARM Secure Services Division Established in Q4 2010 To enable a market for secure applications and
More informationCompute solutions for mass deployment of autonomy
Compute solutions for mass deployment of autonomy Rod Watt Director of Vehicle Architecture and System Analysis Introduction 2 From inception to now 1990 Joint venture between Acorn Computers and Apple.
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationTrusted Platform Modules Automotive applications and differentiation from HSM
Trusted Platform Modules Automotive applications and differentiation from HSM Cyber Security Symposium 2017, Stuttgart Martin Brunner, Infineon Technologies Axiom: Whatever is connected can (and will)
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More information2017 Arm Limited. How to design an IoT SoC and get Arm CPU IP for no upfront license fee
2017 Arm Limited How to design an IoT SoC and get Arm CPU IP for no upfront license fee An enhanced Arm DesignStart Building on a strong foundation Successfully used by 1000s of designers, researchers
More informationBeyond Hardware IP An overview of Arm development solutions
Beyond Hardware IP An overview of Arm development solutions 2018 Arm Limited Arm Technical Symposia 2018 Advanced first design cost (US$ million) IC design complexity and cost aren t slowing down 542.2
More informationDemonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions. Andrei Costin
Demonstration Lecture: Cyber Security (MIT Department) Trusted cloud hardware and advanced cryptographic solutions Topic Prerequisites Security concepts Security-related concepts (e.g., entropy) Virtualization
More informationAccelerating intelligence at the edge for embedded and IoT applications
Accelerating intelligence at the edge for embedded and IoT applications Arm Tech Symposia 2017 Agenda The emergence of intelligence at the edge Requirements for intelligent edge computing IP and technologies
More informationGlobalPlatform Trusted Execution Environment (TEE) for Mobile
GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform
More informationAzure Sphere Transformation. Patrick Ward, Principal Solutions Specialist
Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,
More informationARMv8-M Architecture Technical Overview
ARMv8-M Architecture Technical Overview 10-Nov-2015 Joseph Yiu Senior Embedded Technology Manager, CPU Product Group, ARM Introduction ARM Cortex -M Processors are the most popular processor series in
More informationTerra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)
Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have
More informationThe Remote Exploitation of Unaltered Passenger Vehicles Revisited. 20 th October 2016 Mark Pitchford, Technical Manager, EMEA
The Remote Exploitation of Unaltered Passenger Vehicles Revisited 20 th October 2016 Mark Pitchford, Technical Manager, EMEA Today s hot topic A few years ago, Lynx presentations at events such as this
More informationNew ARMv8-R technology for real-time control in safetyrelated
New ARMv8-R technology for real-time control in safetyrelated applications James Scobie Product manager ARM Technical Symposium China: Automotive, Industrial & Functional Safety October 31 st 2016 November
More informationSmart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017
Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software
More informationBringing the benefits of Cortex-M processors to FPGA
Bringing the benefits of Cortex-M processors to FPGA Presented By Phillip Burr Senior Product Marketing Manager Simon George Director, Product & Technical Marketing System Software and SoC Solutions Agenda
More informationTRESCCA Trustworthy Embedded Systems for Secure Cloud Computing
TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for
More informationPresentation's title
3 rd April 2017 B03 -In-vehicle technology enabler Presentation's title Dominique Bolignano CEO Prove & Run dominique.bolignano@provenrun.com Introducing myself and Prove & Run Dominique Bolignano, previously
More informationARM Trusted Firmware Evolution HKG15 February Andrew Thoelke Systems & Software, ARM
ARM Trusted Evolution HKG15 February 2015 Andrew Thoelke Systems & Software, ARM 1 ARM Trusted for 64-bit ARMv8-A A refresher Standardized EL3 Runtime For all 64-bit ARMv8-A systems Reducing porting and
More informationUEFI updates, Secure firmware and Secure Services on Arm
presented by UEFI updates, Secure firmware and Secure Services on Arm Spring 2018 UEFI Seminar and Plugfest March 26-30, 2018 Presented by Dong Wei & Matteo Carlini (Arm) Agenda UEFI and SBBR/EBBR Updates
More informationDevice to Cloud. Software Hardware Know How
Device to Cloud Software Hardware Know How Who we are q Innovative Australian based company working in Embedded Bluetooth and Wi-Fi for more than 16 years q World leading expertise in embedded Bluetooth
More informationUsing a Separation Kernel to Protect against the Remote Exploitation of Unaltered Passenger Vehicles
Safety & Security for the Connected World Using a Separation Kernel to Protect against the Remote Exploitation of Unaltered Passenger Vehicles 16 th June 2015 Mark Pitchford, Technical Manager, EMEA Today
More informationSecurity of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices
Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Dr. Johann Heyszl, Head of Hardware Security Department Fraunhofer-Institute for Applied and Integrated Security
More informationEmbedded System Security Mobile Hardware Platform Security
1 Embedded System Security Mobile Hardware Platform Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2017 Acknowledgement This slide set
More informationBringing Intelligence to Enterprise Storage Drives
Bringing Intelligence to Enterprise Storage Drives Neil Werdmuller Director Storage Solutions Arm Santa Clara, CA 1 Who am I? 28 years experience in embedded Lead the storage solutions team Work closely
More informationImplementing debug. and trace access. through functional I/O. Alvin Yang Staff FAE. Arm Tech Symposia Arm Limited
Implementing debug and trace access through functional I/O Alvin Yang Staff FAE Arm Tech Symposia 2017 Agenda Debug and trace access limitations A new approach Protocol based Bare metal vs mission mode
More informationEmbedded System Security Mobile Hardware Platform Security
1 Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2016 Acknowledgement This slide set is based on slides provided by
More informationMicrosoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe 5. June 2018
Microsoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe martin.grossen@avnet.eu 5. June 2018 Prepare for the 2nd wave of Digital Transformation Wave 1: The Microcontroller
More informationEDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC
EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity
More informationthe ARMv8-M architecture
Connect TrustZone User technology Guide for the ARMv8-M architecture Version 0.1 Version 2.0 Page 1 of 28 Revision Information The following revisions have been made to this User Guide. Date Issue Confidentiality
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationProfiling and Debugging OpenCL Applications with ARM Development Tools. October 2014
Profiling and Debugging OpenCL Applications with ARM Development Tools October 2014 1 Agenda 1. Introduction to GPU Compute 2. ARM Development Solutions 3. Mali GPU Architecture 4. Using ARM DS-5 Streamline
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More informationBringing Intelligence to Enterprise Storage Drives
Bringing Intelligence to Enterprise Storage Drives Neil Werdmuller Director Storage Solutions Arm Santa Clara, CA 1 Who am I? 28 years experience in embedded Lead the storage solutions team Work closely
More informationDate: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.
Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification
More informationServerReady and Open Standards Accelerating Delivery
ServerReady and Open Standards Accelerating Delivery Dong Wei Senior Director and Lead Architect, DE Arm #Arm Tech Symposia Copyright 2018 Arm Tech Symposia, All rights reserved. The Cloud to Edge Infrastructure
More information智能互联推动嵌入式系统创新. March 2015
智能互联推动嵌入式系统创新 March 2015 1 ARM is a Semiconductor IP Company IDM Foundry Financial Tools/Technology Silicon Partners Equipment Manufacturer ARM Software Platforms CPU GPU Operators + Developers Networking
More informationManaging & Accelerating Innovation with Open Source at the Edge
Managing & Accelerating Innovation with Open Source at the Edge Bill Hunt, CTO - Dianomic Welcome! The IIoT Opportunity Resolve Complexity & Fragmentation with FogLAMP Use case: Defense Contractor Aircraft
More informationIntroduction to Standards based approach to Server
Introduction to Standards based approach to Server Winnie Shao Server & Ecosystem Director Arm Copyright 2018 Arm, All rights reserved. Why do we need a standards-based approach? Arm architecture supports
More informationCortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving
Cortex-A75 and Cortex- DynamIQ processors Powering applications from mobile to autonomous driving Lionel Belnet Sr. Product Manager Arm Arm Tech Symposia 2017 Agenda Market growth and trends DynamIQ technology
More informationARM Multimedia IP: working together to drive down system power and bandwidth
ARM Multimedia IP: working together to drive down system power and bandwidth Speaker: Robert Kong ARM China FAE Author: Sean Ellis ARM Architect 1 Agenda System power overview Bandwidth, bandwidth, bandwidth!
More informationIntel Software Guard Extensions
Intel Software Guard Extensions Dr. Matthias Hahn, Intel Deutschland GmbH July 12 th 2017 cryptovision Mindshare, Gelsenkirchen Intel SGX Making Headlines Premium Content requiring Intel SGX on PC Intel
More informationEach Milliwatt Matters
Each Milliwatt Matters Ultra High Efficiency Application Processors Govind Wathan Product Manager, CPG ARM Tech Symposia China 2015 November 2015 Ultra High Efficiency Processors Used in Diverse Markets
More informationLecture 3 MOBILE PLATFORM SECURITY
Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common
More informationIoT Market: Three Classes of Devices
IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat
More informationMarket Trends and Challenges in Vehicle Security
Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Microcontrollers and Digital Networking Processors A Global Leader
More informationHigh-Performance, Highly Secure Networking for Industrial and IoT Applications
High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationGrowth outside Cell Phone Applications
ARM Introduction Growth outside Cell Phone Applications ~1B units shipped into non-mobile applications Embedded segment now accounts for 13% of ARM shipments Automotive, microcontroller and smartcards
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More information