Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths.

Slides:



Advertisements
Similar presentations
Presented By: Hathal ALwageed 1.  R. Anderson, H. Chan and A. Perrig. Key Infection: Smart Trust for Smart Dust. In IEEE International Conference on.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
SHASHIDHAR PERURU Tamper Resistant Security Mechanisms for Secure Embedded Systems 1.
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Ravi Vasdev SEMINAR ON. WHAT ARE EMBEDDED SYSTEMS  THESE ARE SINGLE BOARD COMPUTERS  THESE ARE ELECTRONIC DEVICES THAT INCORPORATE MICROPROCESSORS.
Ruhr University Bochum Cryptography in Heavily Constraint Environments Christof Paar EUROBITS Center for IT Security COmmunication SecuritY (COSY) Group.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
The Physically Observable Security of Signature Schemes Alexander W. Dent Joint work with John Malone-Lee University of Bristol.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Embedded Systems: Security Reference: Kocher et al., DAC 2004, pp
1 Platform-Based Design A paper by Alberto Sangiovanni-Vincentelli EE 249, 11/5/2002 Presenter: Mel Tsai.
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
Tyus Carver, Josh Clark, Dock O'neal, Kyle Sekellick, Jeremy Smith,
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
ECE 424 Embedded Systems Design Embedded System Security Chapter 14 Ning Weng.
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
A Survey of Mobile Cloud Computing Application Models
Design of the multi-level security network switch system which restricts covert channel Conference: Communication Software and Networks (ICCSN), 2011 IEEE.
SYSLAB A platform for research and testing of decentralised energy resource based power systems Henrik Bindner Wind Energy Systems Wind Energy Division.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Wireless Networks Breakout Session Summary September 21, 2012.
Sogang University Advanced Computing System Chap 1. Computer Architecture Hyuk-Jun Lee, PhD Dept. of Computer Science and Engineering Sogang University.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Hospital Automation using RFID Technology University of Colorado at Colorado Springs College of Engineering & Applied Science Gustavo Florentino.
Cellular Phones as Embedded Systems by Niam Amarnani.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
Chapter 1 — Computer Abstractions and Technology — 1 The Computer Revolution Progress in computer technology – Underpinned by Moore’s Law Makes novel applications.
HIT Standards Committee Identifying Implementation Specifications & Gaps LeRoy Jones – Program Manager Healthcare Information Technology Standards Panel.
Software Security Seminar - 1 Chapter 10. Using Algorithms 조미성 Applied Cryptography.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
Bully Blue Lock Midterm Presentation 2014 Senior Design II.
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Key Management and Distribution Anand Seetharam CST 312.
Study on Cryptographic Application for Smart Card Course Title : Computer Security & E-Payment System Faculty : 김 광 조 김 종 승
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources 1.
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Presented by Edith Ngai MPhil Term 3 Presentation
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources.
Security of Digital Signatures
Overview on Hardware Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Protect Your Hardware from Hacking and Theft
Providing Security for Embedded Devices Through Virtualization
Secure Sockets Layer (SSL)
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
MOBILE DEVICE OPERATING SYSTEM
STRATEGIC ENCRYPTION
Digital Processing Platform
Bastion secure processor architecture
Security in Network Communications
Protect Your Hardware from Hacking and Theft
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
PREPARED BY: RIDDHI PATEL (09CE085)
Hashing Hash are the auxiliary values that are used in cryptography.
Lecture 36.
Lecture 36.
Presentation transcript:

Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths Ravi

Embedded Systems Design Metrics Performance Power Cost Size And SECURITY 2

Factors affecting the security implementation in Embedded Systems Resource Constraint Increasing range of attack techniques Processing capabilities of the embedded systems Power consumption Flexible architecture 3

Security Requirements Varies depending on whose perspective is considered Ex: Cell Phone –Manufacturer –Service provider –Content provider –End user 4

Security Mechanisms Symmetric Ciphers Secure Hash Algorithms Asymmetric Algorithms 5

Security Mechanisms Secure communication protocols Digital Certificates Digital Rights Management 6

Types of Security Attacks Software Attacks Physical and Side-channel Attacks 7

Software Attacks Three Factors or Trinity of Trouble  Complexity  Extensibility  Connectivity 8

Securing against software attacks 9

Physical and Side Channel Attacks Invasive Attacks Non-invasive Attacks 10

Invasive Attacks Physical Attacks  De-packaging  Layout reconstruction  Micro probing or e-beam microscopy 11

Non-Invasive Attacks Timing Analysis Power Analysis –Simple Power Analysis –Differential Power Analysis 12

Architectures for Security Security Processing Architectures Attack – Resistant Architectures 13

Security Processing Architectures Hardware only approach - Cost Effective Software only Approach - Processing Gap - Battery Gap Hybrid Approach 14

Attack-Resistant Architectures Strong process isolation Sealed memory Platform attestation Secure path to the user 15

Conclusion Security is currently specificed in a vague manner Time-to-market pressures Constrained resources Trade-offs 16