Information Security of Embedded Systems 9.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

Slides:



Advertisements
Similar presentations
June Data Practices in Minnesota. June Outline for this presentation Minnesota data practices laws Classification of government data Government.
Advertisements

10/22/20101 Westar Formula Rate and your bill. 10/22/20102 What we will be going over Transferring the results from the Westar Formula Rate to the SPP.
PDAs/Smart Phones and Medical Records in Health Care Mary Z. Mays, PhD Associate Dean and Professor Innovation Institute for Health Professions.
Castellana Grotte 12 aprile Alternating training in Italy Dott. Ruggiero Francavilla Dirigente Ufficio III – USR Puglia.
Information Security of Embedded Systems : Embedded Systems Design Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
What is the End-Goal? Interoperability? Integration? Connectivity?
Summary Overview of Vireo Student Submission of ETDs
Presentation at IEEE AWSITC, June 4, Energy-Efficient Communications via Network Coding Jos Weber Delft University of Technology The Netherlands.
Enterprise Social Networking Tool Comparison October 2010.
25 Novembre 2010 Safe Maintenance through design From machine engineering for safe maintenance to maintenance engineering for safe machine Workshop Maintenance.
LIFE external communications team AEIDL 1 LIFE+ communication Presentation at LIFE+ Kick-off meeting.
Open Days 2010 D. Gubbels Professionalization within the range of volunteer work New challenges for volunteering organizations - Ehrenamt professionalisieren!
Guiding Principle Five Mentoring needs to be tailored to the needs of the individual teacher and, at the same time, verifying their skills as teachers.
January 12, 2010 Updated February 4, Starting in TEA will collect Teacher Class Assignments and Student Course Completion data at the.
Access to research data: action is needed but what action.
Shibboleth Development and Support Services SAML Protected Resources The theory and practice of granularity and management data Ed Dee EDINA.
From reform to managing change
CrypTool August 2010 Dipl.-Inform. Matthäus Wander
Under the Hood of Polymorphism CS-2303, C-Term Under the Hood of Polymorphism CS-2303 System Programming Concepts (Slides include materials from.
NJJN JUNE Fulfilling the Promise of Juvenile Justice by Engaging Crime Victims & Survivors and Those Who Serve Them Presented by: ANNE SEYMOUR
DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.
Kevin M. Johnston MSU TAP Model Effective Discussion Techniques Engage one another concerning your most pressing questions concerning preparing.
® Microsoft Office 2010 Excel Tutorial 3: Working with Formulas and Functions.
Using A series of training presentations How to list your project September,
1 Whats Up: P2P news recommender Anne-Marie Kermarrec Joint work with Antoine Boutet, Davide Frey (INRIA) and Rachid Guerraoui (EPFL) Gossple workshop.
An Analysis of the P2P Traffic Characteristics on File Transfers Between Prefectures and Between Autonomous Systems in the Winny Network Nov. 1,
South Carolina School HACCP
® Microsoft Office 2010 Managing Your Files. XP Objectives Develop file management strategies Explore files, folders, and libraries Create, name, copy,
August 4, The following PEIMS reporting changes have been made to the PEIMS Collection in order to collect the Classroom Link information.
FELABAN Annual Meeting BAFT-IFSA and FELABAN: BUILDING GLOBAL BRIDGES FOR THE BANKING INDUSTRY Punta del Este, Uruguay November 10, 2010.
Linked Lists in C and C++ CS-2303, C-Term Linked Lists in C and C++ CS-2303 System Programming Concepts (Slides include materials from The C Programming.
A useful testing technique and more…
Hash Tables and Constant Access Time CS-2303, C-Term Hash Tables and Constant Access Time CS-2303 System Programming Concepts (Slides include materials.
Multichannel publishing of statistics (electronic publications and database) - Finnish experience Seminar on dissemination of statistics and launching.
Tutorial 5: Working with Excel Tables, PivotTables, and PivotCharts
Tutorial 1 Creating a Database
ACOT Intro/Copyright Succeeding in Business with Microsoft Excel 2010: Chapter1.
Xiang Fu Hofstra University Chung-Chih Li Illinois State University 04/13/20101NFM 2010.
Anonymizing User Location and Profile Information for Privacy-aware Mobile Services Masanori Mano, Yoshiharu Ishikawa Nagoya University 11/2/
Tutorial 3: Communicating Project Information
Muntaha Gharaibeh RN PhD Associate Professor and Dean of Nursing Director of WHOCC for Human Resource Development in Nursing Faculty of Nursing Jordan.
Memory Segmentation of Intel 8086
® Microsoft Office 2010 Integrating Word, Excel and Access.
® Microsoft Office 2010 Integrating Word, Excel, Access, and PowerPoint.
July WELCOME Please take a few moments to review our services.
Forsyth & Goodwin Education Partnerships Alec Forsyth H. A. Forsyth Consultancy Mike Goodwin Education Partnerships University of Wolverhampton Which.
© Wiley Chapter 1 - Introduction to Operations Management Operations Management by R. Dan Reid & Nada R. Sanders 4th Edition © Wiley 2010.
Citizen Participation & Empowerment Chapter 12 Fall
Tutorial on KMIP and FCEAP/GPSK
User Working Group Yannis Ioannidis University of Athens, Greece DL.org All Working Groups Meeting, Rome, May 2010.
Student Learning Outcome Assessment Plan Backward Design with the ending in mind SLOAC Thinking on Paper 11/29/2010 1PRIE Draft.
Collaboration Works! 10/20/20101 Planning Research Institutional Effectiveness.
Quick Training Guide New SpringerLink, August 2010.
Chapter 13 – Aggregate Planning
[Networking Hardwares] [Maninder Kaur]
Tutorial 8 Sharing, Integrating, and Analyzing Data
Michael van der Zel HIT-Architect University Medical Center Groningen, Netherlands RIMBAA WGM Cambridge MA, oct-2010.
Progress with the 3T Demonstrator Proposal A.Marchioro CERN April 2010.
Business Continuity Planning and IT Disaster Recovery.
Code Optimization, Part II Regional Techniques Comp 412 Copyright 2010, Keith D. Cooper & Linda Torczon, all rights reserved. Students enrolled in Comp.
Software Verification 1 Deductive Verification Prof. Dr. Holger Schlingloff Institut für Informatik der Humboldt Universität und Fraunhofer Institut.
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Information Security of Embedded Systems : Foundations of Security II Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Information Security of Embedded Systems : Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Information Security of Embedded Systems : remote access, wireless networks Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Information Security of Embedded Systems : BAN-Logic Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Information Security of Embedded Systems : Logics and Proof Methods, Wrap-Up Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Presentation transcript:

Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST

Embedded Security © Prof. Dr. H. Schlingloff Structure 1. Introductory example 2. Embedded systems engineering 1.definitions and terms 2.design principles 3. Foundations of security 1.threats, attacks, measures 2.construction of safe systems 4. Design of secure systems 1.design challenges 2.safety modelling and assessment 3.cryptographic algorithms 5. Communication of embedded systems 1.remote access 2.sensor networks 6. Algorithms and measures 1.digital signatures 2.key management 3.authentification 4.authorization 7. Formal methods for security 1.protocol verification 2.logics and proof methods

Embedded Security © Prof. Dr. H. Schlingloff Recap –Security Assessment Common Criteria general model catalogue of recommendations: threats, goals, requirements guideline on evaluation methodology and process (EAL)

Embedded Security © Prof. Dr. H. Schlingloff Cryptology

Embedded Security © Prof. Dr. H. Schlingloff Cryptosystems

Embedded Security © Prof. Dr. H. Schlingloff 20106

Embedded Security © Prof. Dr. H. Schlingloff Stream Cyphers and Block Cyphers

Embedded Security © Prof. Dr. H. Schlingloff Cryptanalysis

Embedded Security © Prof. Dr. H. Schlingloff Attack Models

Embedded Security © Prof. Dr. H. Schlingloff Cypher Classification

Embedded Security © Prof. Dr. H. Schlingloff

Embedded Security © Prof. Dr. H. Schlingloff

Embedded Security © Prof. Dr. H. Schlingloff

Embedded Security © Prof. Dr. H. Schlingloff DES, Data Encryption Standard

Embedded Security © Prof. Dr. H. Schlingloff

Embedded Security © Prof. Dr. H. Schlingloff AES, Advanced Encryption Standard

Embedded Security © Prof. Dr. H. Schlingloff AES rounds

Embedded Security © Prof. Dr. H. Schlingloff

Embedded Security © Prof. Dr. H. Schlingloff Implementations

Embedded Security © Prof. Dr. H. Schlingloff Evaluating Block Cyphers