A New Security Platform for High Performance Client SoCs

Similar documents
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

A Developer's Guide to Security on Cortex-M based MCUs

WAVE ONE MAINFRAME WAVE THREE INTERNET WAVE FOUR MOBILE & CLOUD WAVE TWO PERSONAL COMPUTING & SOFTWARE Arm Limited

TZMP-1 Software Reference Implementation. Ken Liu 2018-Mar-12

The Changing Face of Edge Compute

Beyond TrustZone Part 1 - PSA

A Secure and Connected Intelligent Future. Ian Smythe Senior Director Marketing, Client Business Arm Tech Symposia 2017

DPDK on Arm64 Status Review & Plan

Connect your IoT device: Bluetooth 5, , NB-IoT

Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop

Optimize HPC - Application Efficiency on Many Core Systems

New Approaches to Connected Device Security

Implementing debug. and trace access. through functional I/O. Alvin Yang Staff FAE. Arm Tech Symposia Arm Limited

Beyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited

Accelerating intelligence at the edge for embedded and IoT applications

Bringing Intelligence to Enterprise Storage Drives

Connect Your IoT Device: Bluetooth 5, , NB-IoT

Accelerate Ceph By SPDK on AArch64

Fundamentals of HW-based Security

Unleash the DSP performance of Arm Cortex processors

DynamIQ Processor Designs Using Cortex-A75 & Cortex- A55 for 5G Networks

Trustzone Security IP for IoT

Using Virtual Platforms To Improve Software Verification and Validation Efficiency

Cortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving

Compute solutions for mass deployment of autonomy

Tailoring TrustZone as SMM Equivalent

Building firmware update: The devil is in the details

2017 Arm Limited. How to design an IoT SoC and get Arm CPU IP for no upfront license fee

Hardware- Software Co-design at Arm GPUs

How to Build Optimized ML Applications with Arm Software

Cortex-A75 and Cortex-A55 DynamIQ processors Powering applications from mobile to autonomous driving

Advanced IP solutions enabling the autonomous driving revolution

How to Build Optimized ML Applications with Arm Software

Arm s Latest CPU for Laptop-Class Performance

Protecting your system from the scum of the universe

DynamIQ Processor Designs Using Cortex-A75 & Cortex-A55 for 5G Networks

Confessions of a security hardware driver maintainer

Designing Security & Trust into Connected Devices

Designing Security & Trust into Connected Devices

What is gem5 and where do I get it?

Software Ecosystem for Arm-based HPC

Designing Security & Trust into Connected Devices

Protecting your system from the scum of the universe

Making progress vs strategy

Why PartnerDirect. Choice, flexibility, simplicity

Arm crossplatform. VI-HPS platform October 16, Arm Limited

Rendering Structures Analyzing modern rendering on mobile

Modern security for microcontrollers

Advanced Software Features for the LA-950

How to protect Automotive systems with ARM Security Architecture

Standard Cell Design and Optimization Methodology for ASAP7 PDK

Diversity of. connectivity required for scalable IoT devices. Sam Grove Principal Software Engineer Arm. Arm TechCon 2017.

Design Process. in an embedded system. Kasper Ornstein Mecklenburg SW/HW development engineer Arm Limited

Activities of LPI-Japan for Human Resource Development on Linux/OSS

Supplier Training Visual Guide

Improve the container image compatibility on Arm

5G Security from a Network Operator s Point of View

Addressing 7nm Arm DynamIQ Cluster Design Challenges Using the Cadence Digital Implementation Flow

Arm TrustZone Armv8-M Primer

Deep Learning on Arm Cortex-M Microcontrollers. Rod Crawford Director Software Technologies, Arm

Arm s First-Generation Machine Learning Processor

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited

Comprehensive Arm Solutions for Innovative Machine Learning (ML) and Computer Vision (CV) Applications

Machine learning for the Internet of Things

How Can You Trust Formally Verified Software?

Adopt-a-JSR July Meeting

Security and Performance Benefits of Virtualization

How to run applications on Aziz supercomputer. Mohammad Rafi System Administrator Fujitsu Technology Solutions

How Can You Trust Formally Verified Software?

Arm Mbed Edge. Nick Zhou Senior Technical Account Manager. Arm Tech Symposia Arm Limited

Bringing Intelligence to Enterprise Storage Drives

The Work of Containerized NFV Infrastructure on Arm Platform

CCIX: a new coherent multichip interconnect for accelerated use cases

Non-Trusted. software. data. hardware. Open Source Secure World Software Trusted Firmware. Trusted. software. data. Update October 2018

SIERRAWARE SIERRATEE FOR MIPS OMNISHIELD

How Can You Trust Formally Verified Software?

IBM zenterprise System Unified Resource Manager Overview and Update

Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague

OPPORTUNITIES AND CHALLENGES OF DIGITAL TRANSFORMATION FOR ORGANISATIONS WITH MOBILE WORKERS

GlobalPlatform Trusted Execution Environment (TEE) for Mobile

OP-TEE Using TrustZone to Protect Our Own Secrets

ARM Server s Firmware Security

Prof. Han, Min-gyu Hansung University

Jim Gallagher Senior Technical Marketing Lead, MontaVista Software

Linux Kernel Cryptographic API for fun and profit

Windows IoT Security. Jackie Chang Sr. Program Manager

Modernize and Transform Your Storage Network. Alain HUGUET EMEA Technical Alliance Manager for DELL EMC

Web Programming Pre-01A Web Programming Technologies. Aryo Pinandito, ST, M.MT

Tata Hitachi JIM (Japan-India Institute for Manufacturing)

IoT It s All About Security

ARM Trusted Firmware Evolution HKG15 February Andrew Thoelke Systems & Software, ARM

Dr. Sergi Figuerola CTIO, M:

Pulse para editar el formato del texto de título

Stratum Filtering for DDoS Resilient Clouds

HW isolation for automotive environment BoF

HACK MY CHIP: A RED TEAM BLUE TEAM APPROACH FOR SOC SECURITY. David HELY Grenoble INP Esisar LCIS, Valence

Improving Security in Embedded Systems Felix Baum, Product Line Manager

Securing IoT with the ARM mbed ecosystem

Artificial Intelligence Enriched User Experience with ARM Technologies

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security

Transcription:

A New Security Platform for High Performance Client SoCs Udi Maor, Sr. Product manager, Client Line of Business October 2018 udi.maor@arm.com

Agenda What are Client devices? Arm s approach to Trusted Execution on Client devices Introducing CryptoCell-713 Features in CryptoCell-713 Our motivation: Life Cycle of embedded security Premium content AI/ML algorithms Introducing CryptoCell-703 Summary Q&A 2

What are Client devices? 3

Arm s approach to Trusted Execution on Client devices TBSA TBBR & TF-A System & Security IP TrustZone 4

Introducing CryptoCell-713 Enabling a robust, up-to-date, TEE Performant and efficient SM2/3/4 Side Channel Attack countermeasures Robust asset isolation Up to 10s of Man Years saved 5

A (simplified) Life Cycle of embedded security Feature introduced Adopted by the market Value is increased Becomes prone to attacks Robustness rules are updated Cost/Effort To Attack SW security HW based security Physical security Asset value 6

Client security trends Premium content Feature introduced Adopted by market Value increases Becomes prone to attacks Robustness rules updated 7 https://www.rapidtvnews.com/2017121850128/china-siqiyi-to-stream-the-shape-of-water-three-billboardsoutside-ebbing-missouri.html http://4k.com/news/4k-content-ripped-bypirates-from-netflix-and-amazon-isflooding-the-torrent-sites-11276/ https://medium.com/@tanayj/how-much-are-you-worthto-netflix-2fb61feb5441 https://www.emarketer.com/content/thesubscription-video-on-deman-market-inchina-is-booming

Client security trends AI/ML algorithms TBD? Feature introduced Adopted by market Value increases Becomes prone to attacks Robustness rules updated 8 https://www.slideshare.net/kstan2/te nsorflow-on-android https://www.androidauthority.com/bixby-vsgoogle-assistant-vs-siri-763201/ https://www.marketresearchfuture.com/reports/voiceassistant-market-4003 https://heartbeat.fritz.ai/reverseengineering-core-ml-6d6f1c2bdab0

Features in CryptoCell-713 Keeping: CryptoCell-712 s feature set, including FIPS 140-2 certifiability Adding: High performance SM2, SM3 and SM4 TZMP readiness Side Channel Attacks mitigation option Enhancing: Robustness of Secure Boot (code loading) Robustness of provisioning 9

CryptoCell s performance and efficiency benefits Arm invests in the pre-integration of CryptoCell with other IPs (CPUs, MM, System) Sub-systems such as SGM-775 Demos such as the TZMP1 demo presented at Linaro Connect Clear benefits of CryptoCell efficiency in real-life use cases: Up to 20X less dynamic power consumption (SGM-775) 80% increased throughput compared to software in TZMP use-case 10

Decryption Differences Decryption running on CPU Decryption running on CryptoCell Flickering is visible No flickering 11

Decryption Differences Decryption running on CPU Decryption running on CryptoCell Flickering is visible - Load average is higher than number of cores No flickering - Load average is lower than number of cores 12

Time-to-Market savings CryptoCell-713 is FIPS 140-2 certifiable, similar to the recent CryptoCell-712 certification Best practices and reference security policy available to partners FIPS 140-2 readiness alone can save SiPs/OEMs over 10MY of effort Chinese ciphers are designed to be GM/T 0028-2014 compliant 13

Introducing CryptoCell-703 Focused on new requirements for using Chinese ciphers In case the only missing functionality is SM2/3/4 Side Channel Attacks mitigation option 14

Summary The Client trusted execution landscape is evolving Arm offers 2 new CryptoCell products to enable comprehensive, up-to-date TEEs, while keeping Time- To-Market short 15

Questions? 16

Thank You! Danke! Merci! 谢谢! ありがとう! Gracias! Kiitos! 감사합니다 धन यव द 17