Securing the System with TrustZone Ready Program Securing your Digital World. Secure Services Division
|
|
- Stephen Amos Stafford
- 5 years ago
- Views:
Transcription
1 Securing the System with TrustZone Ready Program Securing your Digital World Secure Services Division 1
2 ARM Secure Services Division Established in Q To enable a market for secure applications and services Based on trusted technology foundations: TrustZone Addressing the needs of multiple application areas Content, enterprise, payment, commerce and device management Operating ethos Scalability Interoperability Pragmatic Assurance 2
3 PC Threatscape 3
4 Coming to a Mobile Device Near You The mobile device is fast becoming the centre of our connected lives: Capable business devices Shopping, banking Social networking An increasing amount of mobile malware has been reported over the past several years, which raises concerns for the future, particularly when coupled with the recent trend towards establishing a more open system environment for cellular handheld devices. -NIST Guidelines on Cell Phone and PDA Security - PC-like threats are starting to surface: Trojans, viruses Keyloggers Patch cycles Rich operating systems are vulnerable to attack Q: What is the answer to this? A: HARDWARE BACKED SECURITY 4
5 Hardware Security Starts With Architecture Good SoC design software services Services Software OS Hardware 5
6 TrustZone in 3 Steps 1. Define secure hardware architecture Two separate domains: normal and secure Extends across system Processor, display, keypad, memory, clock, radios 2. Implement in silicon system on chip (SoC) Enforcing secure/normal separation physically 3. Combine SoC with OS Separate but connected to main operating system CPU NORMAL Rich OS CPU SECURE Secure OS Result: A Execution Environment (TEE) Ready to develop and deploy trusted services Execution Environment 6
7 TrustZone Software View TrustZone enables a Execution Environment (TEE) Protects against software attack from open/rich OS Delivers two separate domains, normal and secure Normal App App App Platform / Rich-OS App Secure Monitor Secure App App Secure OS in Execution Environment Secure Boot ARM Processor with TrustZoneSecurity Extensions SoC with Security Aware Components Extends across entire system Beyond the processor Can deliver secure Processing data path On/off-chip memory Input & display Video path etc. TEE provides scalable environment for security applications Content management, strong user authenticated payments, etc. 7
8 Interoperability and Assurance Convergence brings complexity Many standards Many bodies Many purposes Key challenges Applicability to address multiple market requirements Scalability across devices and form factors Certification and Assurance within CE lifecycles We need to make hardware security simple 8
9 Introducing: TrustZone Ready Program Market Requirements Desired Services Industry Factors Security Design Blueprints TEE Integration Interoperability Standard APIs SoC Platform Implementation Industry Certification SoC Platform Assurance SoC Checklist 9
10 Designing the right chip: we can help ARM is making it quicker and easier to develop a SoC with the right security features: Security design blueprints Market requirements Checklists Optional design reviews TrustZone Ready Program ARM working with Ecosystem Design Review (optional) Security Requirements checklist Market Requirements Reviewer s agreements Early access Updates OS Base System Architecture Board Boot Security Blueprints 10
11 ARM Base System Architecture CPU Core Execution Environment Boot Rom Other Non- CPUs and Masters GPU Processor Cluster L1$ L2$ Processors ARMv7A Display External Interface such as IEEE1149.1(JTAG) Serial Wire Debug (SWD) CoreSight Debug Sub- System Display Display Controller System Control and Power subsystem (SCP) External Interface such as IEEE1500 (SECT) Clock Debug Test Manufacturing Other CPUs and Masters SoC Test interface Power control System Integrity INTERCONNECT Configuration registers On-chip memory Region Mapping DMC PHY DDR Configuration Registers SRAM SRAM Boot ROM Scratch SRAM Region Mapping FLASH CTRL PHY FLASH Non Secure Peripherals: Timers, Counters, RTC, MHU, UARTs, etc... OTP/Fuses NV Counter Random Num Gen Real-time Clock WDTimer Secure Peripherals Configurable Secure Peripherals KMI/I2C/ GPIO Input Device input IO RAM Firmwares Boundary2 or higher Switchable Between and Normal World Off-chip memory Has Capabilities Key storage Random number generator Counters and timers Security Anchors 11
12 TrustZone is System Wide Security Complete TrustZone solution consists of: TrustZone-Enabled CPU Core (eg Cortex-A5) TrustZone Software running on the CPU core TrustZone-Aware L2 cache controller (if L2 cache is used) TrustZone-Aware AXI Interconnect Fabric Secure-World Memory (in addition to Normal World memory) TrustZone-Aware Interrupt Controller On-chip OTP protection for encryption and signature keys On-SoC ROM protection for Boot Code Off-SoC Memory Address Space Control Secure Debug Control Disable debug of Secure World ARM can supply System Wide TrustZone Technology 12
13 Giesecke & Devrient (G+D) Mobicore MobiCore at a Glance Normal World - NWd Application TLC API Trustlet Connector (TLC) MC Driver API MobiCore Android TM Driver TCI MCI Secure World - SWd ARM TrustZone with MobiCore Trustlet MC Trustlet API ARM TrustZone with G&D MobiCore MobiCore MobiCore Use Cases MobiCore and Content Protection MobiCore and Enterprise Applications Security Support of the Rich OS MobiCore with Financial Services: -Securing Mobile Banking, NFC and Proximity Payment -New payment methods such as Peer2Peer Money transfer ARM TrustZone enabled SoC G&D Contact Bernhard von Canstein Customer Solutions Phone: +49 (172) bernhard.canstein@gi-de.com Location: Prinzregentenstr Munich, Germany App Development Trustlets are based on Trustlet API Trustlet development in C using the Trustlet SDK Compiling and linking supported with ARM RVCT tools 13
14 Logic Foundations Contact : Christophe Colas, Marketing Director Christophe.Colas@trusted-logic.com Execution Environment Used in multiple security use cases Premium content protection (PlayReady, CPRM, Marlin, DTCP-IP, Widevine,..) Mobile financial services Enterprise services (VPN, SSL, secure , ) Device integrity and management Software Development Kit for 3rd parties APPLICATIONS Rich OS Foundations Supports GlobalPlatform standards Deployed in millions of smartphones and tablets Supports User Interface (critical to payment solutions) Smartphone Processor Crypto Secure Storage User Interface Leverages hardware security features present on hardware platforms including ARM TrustZone 14
15 GlobalPlatform Defining TEE Standards Rich OS Application Environment Client Application DRM Client Application Payment Client Application Corporate Execution Environment Application DRM Application Payment Application Corporate GlobalPlatform TEE Functional API GlobalPlatform TEE Client API GlobalPlatform TEE Internal API Proprietary Interfaces Rich OS TEE Kernel Hardware Platform HW Secure Resources HW Keys, Secure Storage, UI (Keypad, Screen), Crypto accelerators, NFC controller, Secure Element, etc. GlobalPlatform Standards Status : Done Future Development 15
16 GP Compliance and Certification GlobalPlatform Devices Committee Normal World <-> Secure World API already published Secure World App API under public review NOW TEE Working Group will work on Interoperability test suites in 2012 Certification Working Group Will re-use GlobalPlatform Composite Certification Processes Certifying at Chip level Final checking at Device level Defining Security Targets NOW Processes will be defined in
17 Growing Demand for Applications Content Premium content protection Advertising enforcement Cloud-based services Payment Service/ Bank Secure PIN Entry for payments Remote User Authentication Mobile banking Enterprise Anti Malware Data security and storage Identity/SSO Management Commerce Vouchers/Coupons Identity Management Location based services 17
18 How Does TrustZone Help? ❷ ❶ ❸ TrustZone trusted PIN entry path ❶ hardware peripheral input ❷ To trusted software ❸ To trusted authentication service Just as Chip and PIN Point of Sales terminals do today So accepting a transaction from a Certified TEE PIN authenticated device should be lower risk for an internet retailer than from a PC today with no hardware security A corresponding reduction in interchange rate is justifiable alongside reduction in risk possibly approaching cardholder present rates. At the same time, User Experience is SIMPLER than today s PC based payments 18
19 SmartTV, Payment & Content Protection 1 time SETUP Please link your Payment Account Payment Service Provider THE BIG GAME Ticket Price: $10 To Access this Channel Please Enter PIN Internet Content Protection Manager Please Wait... Payment Authorized Installing CP System Scrambled Broadcast Content owner 19
20 Application: Enterprise AIM: Bring better user experience through security Problems to solve Preventative approach rather than reactive best suited to Mobile devices Authentication techniques need simplicity for mobile devices (four digit PIN or biometric matching rather than complex Username/Passwords) Certification WILL be a requirement for some markets (healthcare) Replace additional hardware that is inconvenient to carry Hardware backed security in devices can solve this 2-FA Token Function Handset 2 Factor Authentication Secure Storage Communication Security Corporate Policy Enforcement $20 Annual Price per User $TBD 20
21 Example Use of TrustZone TPM2.0 Microsoft demonstrated TPM2.0 implemented using TrustZone TrustZone/ OS Ideal for: boot, Key storage, Certificates jump to mins 21
22 Benefits of TrustZone Ready Program Quicker to market with right product A cohesive set of documents and checklists developed by ARM in conjunction with major service providers developing trusted applications Clearer target = shorter TTM Faster Industry Certification Reduced cost Fewer re-spins = less $ Increased sales Application processors & devices with recognised security capability will be preferred over those without 22
23 How To Get Involved? 1. Sign up to the TrustZone Ready Enablement Program Access the documents, recommendations & checklists 2. Join GlobalPlatform TEE Working Group 3. Work with G+D or Gemalto for TEE software 4. Build chips/devices/services based on TrustZone + TEE 23
24 In Summary Security is an opportunity for the partnership It will bring your chips and devices more value It will bring new revenue opportunities It will open up new markets Ensure TrustZone based TEE is part of your strategy 24
GlobalPlatform Trusted Execution Environment (TEE) for Mobile
GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform
More informationWhat s In Your e-wallet? Using ARM IP to Enable Security in Mobile Phones. Richard Phelan Media Processing Division TrustZone Security Technology
What s In Your e-wallet? Using ARM IP to Enable Security in Mobile Phones Richard Phelan Media Processing Division TrustZone Security Technology 1 What s In Your Wallet Today? Some cards A bus ticket A
More informationBeyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop
Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Senior Technical Marketing Manager Shenzhen / ARM Tech Forum / The Ritz-Carlton June 14, 2016 Agenda Introduction Security Foundations on Cortex-A
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationHow to protect Automotive systems with ARM Security Architecture
How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Copyright 2016 [ARM Inc.] Outline Wearable & IoT Market Opportunity Challenges in Wearables & IoT Market ARM technology tackles
More informationTrusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague
Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Daniel Heo ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables & IoT
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Ivan H. P. Lin ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables &
More informationBeyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited
Beyond TrustZone PSA Rob Coombs Security Director Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security analyses Summary
More informationTrustzone Security IP for IoT
Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday
More informationThe Next Steps in the Evolution of Embedded Processors
The Next Steps in the Evolution of Embedded Processors Terry Kim Staff FAE, ARM Korea ARM Tech Forum Singapore July 12 th 2017 Cortex-M Processors Serving Connected Applications Energy grid Automotive
More informationExploring System Coherency and Maximizing Performance of Mobile Memory Systems
Exploring System Coherency and Maximizing Performance of Mobile Memory Systems Shanghai: William Orme, Strategic Marketing Manager of SSG Beijing & Shenzhen: Mayank Sharma, Product Manager of SSG ARM Tech
More informationARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO
ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationDate: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.
Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationFundamentals of HW-based Security
Fundamentals of HW-based Security Udi Maor CryptoCell-7xx Product Manager Systems and SW Group ARM Tech Forum 2016 - Korea Jun. 28, 2016 What is system security design? Every system design will require
More informationBeyond TrustZone Part 1 - PSA
Beyond TrustZone Part 1 - PSA Rob Coombs Security Director, Arm Arm Tech Symposia 2017, Hsinchu Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security
More informationMobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013
Mobile Devices as Identity Carriers Pre Conference Workshop October 14 th 2013 Mobile Market Worldwide Smartphones Market by OS (in thousands of units) 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000
More informationDesigning, developing, debugging ARM Cortex-A and Cortex-M heterogeneous multi-processor systems
Designing, developing, debugging ARM and heterogeneous multi-processor systems Kinjal Dave Senior Product Manager, ARM ARM Tech Symposia India December 7 th 2016 Topics Introduction System design Software
More informationNFC embedded microsd smart Card - Mobile ticketing opportunities in Transit
NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical
More informationSIERRAWARE SIERRATEE FOR MIPS OMNISHIELD
SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD Introduction SierraTEE for MIPS OmniShield is a Global Platform compliant Trusted Execution Environment (TEE) designed for devices based on Imagination Technologies'
More informationThe Future of Security is in Open Silicon Linux Security Summit 2018
The Future of Security is in Open Silicon Linux Security Summit 2018 Joel Wittenauer - Embedded Software Architect Rambus Cryptography Research August 28, 2018 Agenda About Rambus Cryptography Research
More informationTrusted Computing As a Solution!
Trusted Computing As a Solution! Brian Berger EVP Marketing & Sales & TCG Director Wave Systems Corp. www.wave.com Trusted Computing Group www.trustedcomputinggroup.org Agenda State of Hardware Security
More informationEmbedded Hardware and Software
Embedded Hardware and Software Saved by a Common Language? Nithya A. Ruff, Director, Product Marketing 10/11/2012, Toronto Synopsys 2012 1 Synopsys Industry Leadership $1,800 $1,600 $1,400 $1,200 $1,000
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationBringing the benefits of Cortex-M processors to FPGA
Bringing the benefits of Cortex-M processors to FPGA Presented By Phillip Burr Senior Product Marketing Manager Simon George Director, Product & Technical Marketing System Software and SoC Solutions Agenda
More informationGrowth outside Cell Phone Applications
ARM Introduction Growth outside Cell Phone Applications ~1B units shipped into non-mobile applications Embedded segment now accounts for 13% of ARM shipments Automotive, microcontroller and smartcards
More informationZatara Series ARM ASSP High-Performance 32-bit Solution for Secure Transactions
1 ARM-BASED ASSP FOR SECURE TRANSACTIONS ZATARA SERIES 32-BIT ARM ASSP PB022106-1008 ZATARA SERIES ADVANTAGE SINGLE-CHIP SOLUTION BEST FEATURE SET IN POS PCIPED PRE-CERTIFIED EMV L1 CERTIFIED TOTAL SOLUTION
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationTrusted Computing Today: Benefits and Solutions
Trusted Computing Today: Benefits and Solutions Brian D. Berger EVP Marketing & Sales Wave Systems Corp. bberger@wavesys.com Copyright 2009 Trusted Computing Group Agenda TCG Vision TCG Benefits Solution
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationEmbedded System Security Mobile Hardware Platform Security
1 Embedded System Security Mobile Hardware Platform Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2017 Acknowledgement This slide set
More informationARM TrustZone for ARMv8-M for software engineers
ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,
More informationAzure Sphere Transformation. Patrick Ward, Principal Solutions Specialist
Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationEmbedded System Security Mobile Hardware Platform Security
1 Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Summer Term 2016 Acknowledgement This slide set is based on slides provided by
More informationOP-TEE Using TrustZone to Protect Our Own Secrets
OP-TEE Using TrustZone to Protect Our Own Secrets ROM-Code Bootloader OP-TEE Kernel Root File System ELC Europe 2017, 23.10.2017 Marc Kleine-Budde Slide 1 - http://www.pengutronix.de
More informationLecture 3 MOBILE PLATFORM SECURITY
Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common
More information3D Graphics in Future Mobile Devices. Steve Steele, ARM
3D Graphics in Future Mobile Devices Steve Steele, ARM Market Trends Mobile Computing Market Growth Volume in millions Mobile Computing Market Trends 1600 Smart Mobile Device Shipments (Smartphones and
More informationSecurity for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics
Security for Secure IoT: Advanced Architectures for IoT Gateways Simon Forrest Director of Segment Marketing, Consumer Electronics www.imgtec.com Imagination Technologies Company overview A world leader
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationNext Generation Enterprise Solutions from ARM
Next Generation Enterprise Solutions from ARM Ian Forsyth Director Product Marketing Enterprise and Infrastructure Applications Processor Product Line Ian.forsyth@arm.com 1 Enterprise Trends IT is the
More informationThe Trusted Execution Environment:
The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market White Paper February 2011 secretariat@globalplatform.org www.globalplatform.org 2011 GlobalPlatform
More informationHow I Learned to Stop Worrying and Love the Internet of Things
SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity
More informationInnovation is Thriving in Semiconductors
Innovation is Thriving in Semiconductors Mike Muller Chief Technology Officer ARM TechCon Nov 10, 2015 BBC Model B ARM1 ARM Holdings Cortex-M0 BBC micro:bit 1981 1985 1990 2015 Core Tech Transisto r Design
More informationBuilding High Performance, Power Efficient Cortex and Mali systems with ARM CoreLink. Robert Kaye
Building High Performance, Power Efficient Cortex and Mali systems with ARM CoreLink Robert Kaye 1 Agenda Once upon a time ARM designed systems Compute trends Bringing it all together with CoreLink 400
More informationSecurity Strategy for Mobile ID GSMA Mobile Connect Summit
Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless
More informationAMD Security and Server innovation
presented by AMD Security and Server innovation UEFI PlugFest March 18-22, 2013 Roger Lai AMD TATS BIOS Development Group Updated 2011-06-01 UEFI Spring PlugFest March 2013 www.uefi.org 1 Agenda Exciting
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationARM mbed Technical Overview
ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationWEB-APIs DRIVING DIGITAL INNOVATION
WEB-APIs DRIVING DIGITAL INNOVATION Importance of Web-APIs Simply put, Web-APIs are the medium to make a company s digital assets consumable to any channel, which has a current or latent need. It helps
More informationHardened Security in the Cloud Bob Doud, Sr. Director Marketing March, 2018
Hardened Security in the Cloud Bob Doud, Sr. Director Marketing March, 2018 1 Cloud Computing is Growing at an Astounding Rate Many compelling reasons for business to move to the cloud Cost, uptime, easy-expansion,
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationKey Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge
Key Threats Internet was just growing Mail was on the verge Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering Key Threats Code Red and Nimda (2001), Blaster (2003), Slammer
More informationZynq-7000 All Programmable SoC Product Overview
Zynq-7000 All Programmable SoC Product Overview The SW, HW and IO Programmable Platform August 2012 Copyright 2012 2009 Xilinx Introducing the Zynq -7000 All Programmable SoC Breakthrough Processing Platform
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationScalable Security solutions to enable Cyber Security and to manage Digital Identities
Scalable Security solutions to enable Cyber Security and to manage Digital Identities It s all about managing identities GIC@CeBIT 2017 International Cyber Security Conference Axel Deininger 20.03.2017
More informationConnect Your IoT Device: Bluetooth 5, , NB-IoT
Connect Your IoT Device: Bluetooth 5, 802.15.4, NB-IoT Craig Tou Business Development Manager, Arm Arm Tech Symposia 2017, Taipei IoT Devices - Everything Connects New classes of connectivity for a new
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationHigh-Performance, Highly Secure Networking for Industrial and IoT Applications
High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications
More informationEDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC
EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity
More informationSecure RISC-V. A FIPS140-2 Compliant Trust Module for Quad 64-bit RISC-V Core Complex
Secure RISC-V A FIPS140-2 Compliant Trust Module for Quad 64-bit RISC-V Core Complex Shumpei Kawasaki, Murthy Vedula, Software Hardware Consulting Group Kesami Hagiwara, Cong-Kha Pham, University of Electro-Communications
More informationSecure Elements 101. Sree Swaminathan Director Product Development, First Data
Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of
More informationWelcome. Altera Technology Roadshow 2013
Welcome Altera Technology Roadshow 2013 Altera at a Glance Founded in Silicon Valley, California in 1983 Industry s first reprogrammable logic semiconductors $1.78 billion in 2012 sales Over 2,900 employees
More informationCh 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated
Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture
More informationTECHNICAL STANDARDS ASSESSMENT REPORT
TECHNICAL STANDARDS ASSESSMENT REPORT 7/28/2018 Version 2.0, M. Ficken 1 Table of Contents 1 Table of Contents... 2 2 Scope... 3 2.1 ATMIA Next Gen Blueprint... 3 3 ASSESSMENT... 4 3.1 BIGGER PICTURE...
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationSecuring Multiple Mobile Platforms
Securing Multiple Mobile Platforms CPU-based Multi Factor Security 2010 Security Workshop ETSI 2010 Security Workshop Navin Govind Aventyn, Inc. Founder and CEO 1 Mobile Platform Security Gaps Software
More informationIntroduction to Sitara AM437x Processors
Introduction to Sitara AM437x Processors AM437x: Highly integrated, scalable platform with enhanced industrial communications and security AM4376 AM4378 Software Key Features AM4372 AM4377 High-performance
More informationDie Zukunft des M-Payment The future of m-payment NFC. Andreas Johne. Düsseldorf, 25. Januar 2008
Die Zukunft des M-Payment Düsseldorf, 25. Januar 2008 Andreas Johne Agenda Brief company presentation M-payment with Near Field Communication Success stories with Page 2 Giesecke & Devrient From Printing
More informationStrong Authentication for Physical Access using Mobile Devices
Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451
More informationIntel and Symantec: Improving performance, security, manageability and data protection
Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1 Session Objectives By the
More informationBUD Status of Android AOSP TV Project. Khasim Syed Mohammed, Tech Lead Linaro Home Group
BUD17-118 Status of Android AOSP TV Project Khasim Syed Mohammed, Tech Lead Linaro Home Group Overview ENGINEERS AND DEVICES WORKING TOGETHER What is AOSP TV Project about? Focus and Goals of AOSP TV project
More informationUse of Mojo PowerPoint Template. Your name, Title
Use of Mojo PowerPoint Template Your name, Title 1 OCP CBW Campus, Branch, Wi-Fi Rajat Ghai Lead OCP-CBW 2 Disaggregation of H/W & S/W at the edge Campus, Branch, Wi-Fi 3 OCP-CBW 2017 H/W (Wi-Fi) 5 open
More informationMobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan CARDIS 2012 Graz, Austria November 29, 2012 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest
More informationVeloce2 the Enterprise Verification Platform. Simon Chen Emulation Business Development Director Mentor Graphics
Veloce2 the Enterprise Verification Platform Simon Chen Emulation Business Development Director Mentor Graphics Agenda Emulation Use Modes Veloce Overview ARM case study Conclusion 2 Veloce Emulation Use
More informationSoftware Development Using Full System Simulation with Freescale QorIQ Communications Processors
Patrick Keliher, Simics Field Application Engineer Software Development Using Full System Simulation with Freescale QorIQ Communications Processors 1 2013 Wind River. All Rights Reserved. Agenda Introduction
More informationSMART DEVICES: DO THEY RESPECT YOUR PRIVACY?
SMART DEVICES: DO THEY RESPECT YOUR PRIVACY? Systems and Mobile Research Lab, Department of Computer Science and Engineering INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Presenter: Sandip Chakraborty sandipc@cse.iitkgp.ac.in
More informationIoT Market: Three Classes of Devices
IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat
More informationFIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication
FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity
More informationBuilding secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On
Building secure devices on the intelligent edge with Azure Sphere Paul Foster, Microsoft Dr Hassan Harb, E.On Microcontrollers (MCUs) low-cost, single chip computers 9 BILLION new MCU devices built and
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationImplementing debug. and trace access. through functional I/O. Alvin Yang Staff FAE. Arm Tech Symposia Arm Limited
Implementing debug and trace access through functional I/O Alvin Yang Staff FAE Arm Tech Symposia 2017 Agenda Debug and trace access limitations A new approach Protocol based Bare metal vs mission mode
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationOCP Engineering Workshop - Telco
OCP Engineering Workshop - Telco Low Latency Mobile Edge Computing Trevor Hiatt Product Management, IDT IDT Company Overview Founded 1980 Workforce Approximately 1,800 employees Headquarters San Jose,
More informationThe Next Steps in the Evolution of ARM Cortex-M
The Next Steps in the Evolution of ARM Cortex-M Joseph Yiu Senior Embedded Technology Manager CPU Group ARM Tech Symposia China 2015 November 2015 Trust & Device Integrity from Sensor to Server 2 ARM 2015
More informationTransforming the way people watch TV
Transforming the way people watch TV Nokia Siemens Networks Ubiquity Multiscreen TV Platform - Executive summary An open solution for delivering TV and Internet as a single service on any device over any
More information