Top Banner
Copyright © 2018 Arm, All rights reserved. Simplifying IoT and Embedded Security Mayank Sharma Senior Product Manager, IoT Device IP Arm
25

Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

May 22, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

Copyright © 2018 Arm, All rights reserved.

Simplifying IoT and Embedded Security

Mayank Sharma

Senior Product Manager, IoT Device IP

Arm

Page 2: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

2Copyright © 2018 Arm, All rights reserved.

The facts about IoT security

The challenges of IoT security

are growing

IoT security trends are becoming

more complex

There are four main types of

attack to protect

yourself from

Arm can help simplify IoT

Security

Page 3: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

3Copyright © 2018 Arm, All rights reserved.

Page 4: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

4Copyright © 2018 Arm, All rights reserved.

Trends impacting security today

Political trendsSecurity spending gets

squeezed

Government legislation / labeling

Technology trendsMore targets, more

accessible

AI Automation / quantum computing battle

Economic trendsEarly Adopters get a head

start

Regulatory compliance will be prime influencer

Social trendsDigital safety vs online

security

There will be more high profile security hacks and

attacks

Page 5: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

5Copyright © 2018 Arm, All rights reserved. 5

Arm has always cared about security

Page 6: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

6Copyright © 2018 Arm, All rights reserved.

Arm CryptoCell

TEE for Cortex-A

Cortex-A with

TrustZone

SecurCore

Security is a part of Arm’s DNA

Secure Enclave / CryptoIsland

iSIMtechnology

Kigen family

PSA launched

PSA threat models

PSA TF-M

Armv8-M processors:

Cortex-M23/M33 with Arm TrustZone

Arm security

manifesto

Mbed

Physical security

enhancements

Arm IP covers a variety of attack surfaces

2004 2018…

Physical vulnerabilities

Communication vulnerabilities

Lifecycle vulnerabilities

Software vulnerabilities

PSA APIs

PSA specifications

Page 7: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

7Copyright © 2018 Arm, All rights reserved.

Arm’s Vision For IoT SecurityKey IoT security considerations

Security needs to built-in from the ground up

1 A collectiveindustry

responsibility

2

Providing a framework to ensure consistent security

Platform Security Architecture (PSA) is the perfect starting point

Security needsto be simple,

with seamless integration

3

Page 8: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

8Copyright © 2018 Arm, All rights reserved.

Three main classes of IoT device

Software architecture

Rich IoT nodes & gateways Mainstream Constrained

Data processing at the edge

Decision making

Machine learning

Gateway to cloud

Balancing performance and cost

Moderate data / audio processing

High power efficiency

Ultra-low-cost, sensors or beacons

Often battery powered

Connecting to gateway or cloud

Page 9: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

9Copyright © 2018 Arm, All rights reserved. 9

How do you know what to protect from?

Page 10: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

10Copyright © 2018 Arm, All rights reserved.

Platform Security ArchitectureConsistently design-in the right level of security into low cost IoT devices

Page 11: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

11Copyright © 2018 Arm, All rights reserved.

Nov 2017 Feb 2018 March 2018 …October 2018

Delivering On Our Vision

PSA announced offering a framework for developing

secure devices, economically

First PSAspecifications will

become public

Arm announces the PSA APIs and test kits

Example threat models made available

Arm announces Trusted Firmware-M open-source project

Visit www.arm.com/psa-resources

PSA is a reality

Page 12: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

12Copyright © 2018 Arm, All rights reserved.

Security is a shared responsibilitySilicon CloudSoftware Security Systems

Page 13: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

13Copyright © 2018 Arm, All rights reserved. 13

Four types ofvulnerabilities

Page 14: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

14Copyright © 2018 Arm, All rights reserved.

Matching the Vulnerability with the Right MitigationPSA Analysis StageAssess the potential vulnerabilities

Software• buffer overflows • interrupts• malware

Physical• non-invasive• invasive

Lifecycle• code downgrade• ownership

changes• unauthorized

overproduction• Debug hacks

Communication• man-in-the-middle • weak RNG• code

vulnerabilities

Confidential © Arm 2018

Physical mitigation Software mitigation

Lifecycle mitigationCommunication mitigation

Arm SecurCore,Arm Cortex-M35P,CryptpCell-312P,CryptoIsland-300P

Arm TrustZone, CMSIS-ZONEArm Keil MDK and Armprocessors with TrustZonesupport

Arm CryptoCell & CryptoIsland,Arm Pelion IoT Platform,Arm CoreLink SDC-600

Arm CryptoCell & CryptoIsland,Arm Pelion IoT Platform

Page 15: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

15Copyright © 2018 Arm, All rights reserved.

Achieving Software Isolation

Two Cortex-M processors

Cortex-M

SRAM

Interconnect

SRAMFlash Peripherals

Cortex-M

SRAM

Software architecture

Hardware requirements

TrustZone for Armv8-M

Page 16: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

16Copyright © 2018 Arm, All rights reserved.

Platform Security For Strict PPA Constraints

Physical Protection – against side-channel attacks and more invasive attacks

Arm CryptoIsland - security enclave, fully isolated from host processor

Arm CryptoCell – hardware base security infrastructure

Asymmetric Crypto

Symmetric Crypto

Security resources

Keys and assets

Code and data

protection

Permission and access

control

Secure Arm processor

Secure memories

Secure always on Mailbox

Page 17: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

17Copyright © 2018 Arm, All rights reserved.

Extending Arm’s range of security IP into physical protection

A new Cortex-M processor with tamper resistance and software isolation with TrustZone for Armv8-M

Security enclave and cryptography IP with protection against side-channel attacks and more

Making it easier for designers to protect devices against different physical attack types

Page 18: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

18Copyright © 2018 Arm, All rights reserved.

From chip to cloud – total IoT securityApplications Ecosystem

(App Development Enablement)

Device Ecosystem

Connectivity Management Services

Device Management Services

Data Management Services

Chip

-to-

clou

d se

curit

yEnterprise+

Other Data

Page 19: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

19Copyright © 2018 Arm, All rights reserved. 19

Making security even simpler

Page 20: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

20Copyright © 2018 Arm, All rights reserved.

Arm secure foundation solutions

• Corstone foundation IP (former SDKs)

• Pre-verified, configurable system and subsystem IP

• Modifiable subsystem IP

• Pre-integrated with processor / security IP

• Tools• Models / FPGA / test chip boards

• Development tools

• Corstone ready software (e.g. Mbed OS)

Complete system approach

Page 21: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

21Copyright © 2018 Arm, All rights reserved.

Designing Secure IoT Systems Arm Secure Foundation Solutions

Identify threatsDefine secure

architecture

Acquire security IP

Design secure

hardware

Design secure

software

Integrate cloud

security

Integrate system

Page 22: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

22Copyright © 2018 Arm, All rights reserved.

Designing Secure IoT Systems Arm Secure Foundation Solutions

Identify threatsDefine secure

architecture

Acquire security IP

Design secure

hardware

Design secure

software

Integrate cloud

security

Integrate system

Identify threats Use Arm secure foundation Integrate system

Page 23: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

23Copyright © 2018 Arm, All rights reserved.

Get started with a good foundation

Corstone-700 foundation IP

Secure enclave

Linux support

Rich IoT / Gateways

Corstone-200 foundation IP

Arm TrustZone

Mainstream systems

Corstone-100 foundation IP

Basic security features Constrained systems

Corstone brings you• Reduced time-to-

market

• Built-in security

• Lower design cost

Page 24: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

24Copyright © 2018 Arm, All rights reserved.

From Chip to Cloud – Total IoT Security

PELION

Page 25: Simplifying IoT and EmbeddedSecurity · Three main classes of IoT device. Software architecture. Rich IoT nodes & gateways. Mainstream. Constrained. Data processing at the edge Decision

25Copyright © 2018 Arm, All rights reserved.

Trademark and copyright statementThe trademarks featured in this presentation are registered and/or unregistered trademarks of Arm (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be trademarks of their respective owners.

Copyright © 2018

Thank You!

25