cyber secure communication over the internet · •a key driver is the internet of things (iot)...
TRANSCRIPT
Cyber Secure communication over the internet
Hans Klos
Scalys BV
Scalys E&A 2019 presentatie 1mei-19
About Scalys
• Founded 2017, based in Hengelo, the Netherlands.
• We offer a unique set of High-Grade Secure Communication solutions and products.
• We combine leading technology with innovative design concepts to modernize and secure the communication of connected devices.
Scalys E&A 2019 presentatie 2mei-19
Can I trust my device ?
• Will it function as designed?
• Can I reliable identify the device?
• Can I update it securely?
• Will it resist attacks?
• Does it protect sensitive data and assets?
Scalys E&A 2019 presentatie 3mei-19
Need for Hardware Security
• Demand for Hardware Security increasing with growing security needs in embedded, networking devices and cloud services
• A key driver is the Internet of Things (IoT)
• Multi-layered approach to security needed• establishing a trusted computing baseline that anchors trust in tamper-proof
hardware
• A strong hardware security layer essential for realizing secure systems
Scalys E&A 2019 presentatie 4mei-19
Why hardware security in IoT devices?
Today’s IoT is all around us. From smart cities to industries, homes and more. It is an everyday reality and the number of connected devices is rising rapidly.
But the rapid increase of connected devices also may cause a weak spot: Security. Connected devices are potential targets for those seeking unauthorized access to the network and to the device cloud, malicious control of the device, or theft of IoT collected data.
Scalys E&A 2019 presentatie 5mei-19
Developing a cyber secure hardware platform
• Which (security) certifications needs to be met?
• Tamper resistant product?
• Which processing platform will be used?• Intel based, ARM based, other …
• Develop a complete SW layer for security (e.g. implement TEE), or will use Third Party security software vendors
• Long Livety support (impact on selection of components)
• Environmental conditions (consumer, industrial, …)
Scalys E&A 2019 presentatie 6mei-19
Anatomy of a Trustworthy Device
Scalys E&A 2019 presentatie 7mei-19
Related Keys and certificates• OEM• Cloud• Customers
Trusted Boot
Trusted ID
Trusted Execution
Firmware Update
Resilience
QorIQ® Trust Architecture
The QorIQ Trust Architecture is a set of hardware and software techniques designed to support trusted boot and maintain the trusted environment during runtime.
The Trust Architecture is based on capabilities and intellectual property developed by NXP and deployed on multiple NXP platforms. These capabilities have been modified and extended as appropriate to the needs of secure network and access infrastructure.
The Trust Architecture is implemented via a highly-integrated combination of trusted software and trusted hardware.
Scalys E&A 2019 presentatie 8mei-19
Trust Architecture - Features
• Secure Boot
• Secure Storage
• Key Protection
• Key Revocation
• Secure Debug
• Tamper Protection
• Virtualization and Strong Partitioning
• Manufacturing Protection
Scalys E&A 2019 presentatie 9mei-19
ManufacturingProtection
8
SecureBoot
1Secure
Storage2
KeyProtection
3
KeyRevocation
4
SecureDebug
5
TamperDetection
6
Virtualization/Strong
Partitioning 7
Trust Architecture - Threats
• Unauthorized software
• Faulty software (BUGs) and Malicious external software
• External intrusion
Scalys E&A 2019 presentatie 10mei-19
ManufacturingProtection
8
SecureBoot
1Secure
Storage2
KeyProtection
3
KeyRevocation
4
SecureDebug
5
TamperDetection
6
Virtualization/Strong
Partitioning 7
Trust Architecture - Unauthorized software
Is my device running authorized software, which has not been tampered with?
• Secure boot guaranties no arbitrary code can be used to system
• Security monitor can monitor external memory, to detect external modification of memory. (protect running system software against modification)
• Key revocation system allows for revocation of up-to 3 keys before system becomes obsolete
Scalys E&A 2019 presentatie 11mei-19
Trust Architecture - Hypervisor
• Combination of Hardware and software features to partition HW into separate systems
• Detection of Partitions which try to access unauthorized sections, with configurable result (e.g., Hardware zeroization of memory, and reset of system)
• Multiple hypervisors can be used :• KVM
• Integrity
• XEN
• ....
Scalys E&A 2019 presentatie 12mei-19
Trust Architecture - Faulty software (BUG’s)
• Hypervisor mode of operations allow for strict partitioning of system, preventing escalation of privilege.
• SMMU controls access to peripherals, assuring only authorized partitions can access certain peripherals.
• Detection of unauthorized access attempts allows appropriate action to clear secrets
Scalys E&A 2019 presentatie 13mei-19
Benefits realized
• Firmware protection
• Resilience
• Secure storage
• Key/Certificate based
• Secure firmware updates
• Payload authentication
• Cloud authentication
• Secure communications
• TLS
• OpenSSL engine integrated into secure enclave (isolated)
Scalys E&A 2019 presentatie 14mei-19
Can I TRUST my device ?
Will it function as designed?
Can I reliable identify the device?
Can I update it securely?
Will it resist attacks?
Does it protect sensitive data and
assets?
Contact us
Scalys E&A 2019 presentatie 15mei-19