SlideShare a Scribd company logo
1 of 20
Download to read offline
- 1 -
Mobile & Embedded System Lab.
Dept. of Computer Engineering
Kyung Hee Univ.
Design of a IoT Device Security Platform
based on Integrated Security SoC
Presented by Junyoung Jung
- 2 - Kyung Hee University
Mobile Embedded System Lab.
Motivation (1/2)
 Recent Trends
 Accelerated the launch of a variety of IoT products & services
 Developed the COTS IoT device platform
▶ Raspberry Pi, Arduino, ESP8266, etc
 Problems
 COTS IoT device platform
▶ Low CPU, Small memory, Low cost chip/sensor
▶ Absence of Security functions
 Existing Security technology (for Server/PC)
▶ Demand Large Memory and Fast computing power
Difficult to apply Security functions
to IoT device platform
- 3 - Kyung Hee University
Mobile Embedded System Lab.
Motivation (2/2)
 Hardware Security Module (Presented by oneM2M)
 SE(Secure Elements)
▶ Ensure Data/Firmware integrity
▶ Require strong Authentication method
 Isolated system’s Problems (Microprocess + SE)
 Reverse Engineering attack
▶ Memory/SE de-soldering
 Hardware Trojan attack
▶ Malicious hardware invasion
Propose IoT device security platform
based on Integrated Security SoC
- 4 - Kyung Hee University
Mobile Embedded System Lab.
Related works (1/2)
 Integrated Security SoC (eWBM MS500)
 Security features
▶ Secure Key Management
 Non Volatile Memory (eFuse)
▶ Secure Storage
 Flash Memory
▶ Root of Trust
 1st Bootloader
▶ Crypto Blocks
 Symmetric Crypto Accelerator (AES, ARIA)
 Asymmetric Crypto Accelerator (RSA, ECC)
 True Random Number Generator
- 5 - Kyung Hee University
Mobile Embedded System Lab.
Related works (2/2)
 oneM2M Security Requirements (TS-0003. Security Solutions)
 Access Management
▶ Using the encryption functions of the SE for data integrity
▶ Using the encryption functions of the SE for authentication
 Security Administration
▶ Pre-provisioning of sensitive data to SE
▶ Management of sensitive data via secure channel
 Sensitive Data Handling
▶ Secure storage of sensitive data using SE
▶ Secure management of sensitive data using SE
- 6 - Kyung Hee University
Mobile Embedded System Lab.
Proposed System (1/6)
 Security functions
① Secure Key Storage & Management
▶ Ensure availability of sensitive data(e.g., Encryption key)
▶ Correspondence) Sensitive Data Handling
② Secure Boot
▶ Verify firmware integrity
▶ Correspondence) Access Management
③ Secure Firmware Update
▶ Ensure safety of firmware update
▶ Correspondence) Access Management, Sensitive Data Handling
④ Secure Communication
▶ Ensure secure channel of device-to-device communication
▶ Correspondence) Security Administration
⑤ Remote Attestation
▶ Verify device trust
▶ Correspondence) Access Management, Security Administration
- 7 - Kyung Hee University
Mobile Embedded System Lab.
Proposed System (2/6)
 Secure Key Storage & Management
MS500-iSE
BootROM
1 𝑠𝑡 𝐵𝐿
eFuse
𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚
𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒
TRNG
(True Random
Number
Generator)
ACA
(Asymmetric
Crypto
Accelerator)
SCA
(Symmetric
Crypto
Accelerator)
Flash Memory
Public Section
2 𝑛𝑑 𝐵𝐿
𝐹𝑊𝐶𝑢𝑟
Private Section
𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟
𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝐶𝑢𝑟) 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝐹𝑊𝑉𝐶𝑢𝑟)
𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡) 𝐶𝑒𝑟𝑡𝑖𝑆𝐸
< Data Encrypt method >
- 8 - Kyung Hee University
Mobile Embedded System Lab.
Proposed System (3/6)
 Secure Boot
< System Architecture >
< Sequence Diagram >
MS500-iSE
1 𝑠𝑡 𝐵𝐿 2 𝑛𝑑 𝐵𝐿 𝐹𝑊
Verify 2 𝑛𝑑
𝐵𝐿
( In: 2 𝑛𝑑
𝐵𝐿 𝑀𝐴𝐶, 𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚 )
Transfer control to 2 𝑛𝑑 𝐵𝐿
MS500-iSE
BootROM
eFuse
1 𝑠𝑡 𝐵𝐿 (includes 2 𝑛𝑑
𝐵𝐿 𝑀𝐴𝐶)
𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒
𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚
Flash
Private Section
𝐶𝑒𝑟𝑡𝑖𝑆𝐸
𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡)
𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝐶𝑢𝑟))
𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝐶𝑢𝑟)
𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟
𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒
Public Section
𝐹𝑊
2 𝑛𝑑 𝐵𝐿
𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡
𝑆𝑖𝑔𝑛 𝐶𝐴
Verify 𝐹𝑊
( Compare 𝐻(𝐹𝑊) and 𝐻(𝐹𝑊𝐶𝑢𝑟) )
Extract 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝐶𝑢𝑟))
( referring to 𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟 )
Transfer control to 𝐹𝑊𝐶𝑢𝑟
Compute 𝐻(𝐹𝑊)
- 9 - Kyung Hee University
Mobile Embedded System Lab.
Proposed System (4/6)
 Secure Firmware Update
< Sequence Diagram >
MS500-iSE Storage FW Author
Upload 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤
Upload 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑁𝑒𝑤)
Query 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝐶𝑢𝑟
Send 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤
Validate 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤
referring to 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 )
Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤))
Request 𝐹𝑊𝑁𝑒𝑤
Send 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐹𝑊𝑁𝑒𝑤)
Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑁𝑒𝑤)
Store 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤
( 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝑁𝑒𝑤), 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝑁𝑒𝑤)) )
Store 𝐹𝑊𝑁𝑒𝑤
Validate 𝐹𝑊𝑁𝑒𝑤 and 𝐹𝑊𝑉𝑁𝑒𝑤
Create 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤
Reboot (Normal Boot, where BL2 replaces 𝐹𝑊𝐶𝑢𝑟 with 𝐹𝑊𝑁𝑒𝑤)
Reboot (Secure Boot)
𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤
𝐹𝑊𝑉𝑁𝑒𝑤 (Firmware Version)
𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝐹𝑊𝑁𝑒𝑤))
𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤))
Sign 𝐹𝑊 𝑁𝑒𝑤
MS500-iSE
eFuse
𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒
Flash
Private Section
𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝐶𝑢𝑟)
𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝑁𝑒𝑤)
𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟
𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝐶𝑢𝑟))
𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝑁𝑒𝑤))
Public Section
𝑂𝑢𝑡𝑑𝑎𝑡𝑒𝑑 𝐹𝑊
𝑁𝑒𝑤 𝐹𝑊
- 10 - Kyung Hee University
Mobile Embedded System Lab.
Proposed System (5/6)
 Secure Communication
Message Exchange
SSL Handshake
MS500-iSE
(mbedTLS-based)
Server
(OpenSSL-based)
Hello message
Send 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑆𝑒𝑟𝑣𝑒𝑟
Send 𝐸(𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟 , 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛)
Encrypted message (𝐸(𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛, 𝐷𝑎𝑡𝑎) )
TCP/IP Connection
Extract 𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟 in 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑆𝑒𝑟𝑣𝑒𝑟
Encrypt 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛 using 𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟
Decrypt 𝐸(𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟, 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛)
< Sequence diagram >
Server
OpenSSL-based service
𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛
Storage
𝑃𝑟𝑖𝐾𝑆𝑒𝑟𝑣𝑒𝑟
𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑆𝑒𝑟𝑣𝑒𝑟
Generate 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛
MS500-iSE
Flash
Public Section
𝐹𝑊
mbedTLS Library
SRAM
𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑆𝑒𝑟𝑣𝑒𝑟
𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛
𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟
- 11 - Kyung Hee University
Mobile Embedded System Lab.
Proposed System (6/6)
 Remote Attestation
Device verification
Device provisioning
Attestation request (SSL Session)
MS500-iSE
Attestation
Server
Certificate
Authority
FW Author
𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡
Publish 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝐶𝐴
Generate Certificate
Send 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸, 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡
Request attestation
Decrypt 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡)
Generate 𝐻( 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 )
Send 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡
Sign 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 using 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡
Send 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡, 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 & 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸
Verify 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸
Decrypt 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡, 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒
using 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡
Extract 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 from 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸
Verify 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒
Success
MS500-iSE
eFuse
𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒
Flash
Private Section
𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡)
𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝐶𝐴
𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡
𝑆𝑖𝑔𝑛 𝐶𝐴
𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒
Public Section
𝐹𝑊
- 12 - Kyung Hee University
Mobile Embedded System Lab.
Security Analysis (1/6)
 Security Threats
 Bootloader Replace Attack
 Firmware Replace Attack
 Rollback Attack
 Man in the Middle Attack
- 13 - Kyung Hee University
Mobile Embedded System Lab.
Security Analysis (2/6)
 Security Threats
 Bootloader Replace Attack
▶ Countermeasures) Secure Boot
MS500-iSE
𝐹𝑊𝐶𝑢𝑟𝑀𝑜𝑑𝑖𝑓𝑖𝑒𝑑 2 𝑛𝑑
𝐵𝐿1 𝑠𝑡
𝐵𝐿
Verify 2 𝑛𝑑 𝐵𝐿
( In: 2 𝑛𝑑 𝐵𝐿 𝑀𝐴𝐶, 𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚 )
Infected boot
( Halt boot process )
- 14 - Kyung Hee University
Mobile Embedded System Lab.
Security Analysis (3/6)
 Security Threats
 Firmware Replace Attack
▶ Countermeasures) Secure Boot, Remote Attestation
Verify 2 𝑛𝑑
𝐵𝐿
( In: 2 𝑛𝑑
𝐵𝐿 𝑀𝐴𝐶, 𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚 )
Transfer control to 2 𝑛𝑑
𝐵𝐿
Extract 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝐶𝑢𝑟))
( referring to 𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟)
Compute 𝐻(𝐹𝑊)
MS500-iSE
𝑀𝑜𝑑𝑖𝑓𝑖𝑒𝑑 𝐹𝑊2 𝑛𝑑 𝐵𝐿1 𝑠𝑡 𝐵𝐿
Infected boot
( Halt boot process )
Verify 𝐹𝑊
( Compare 𝐻(𝐹𝑊) and 𝐻(𝐹𝑊𝐶𝑢𝑟) )
MS500-iSE
(Infected FW)
Attestation
Server
Device verification
Attestation request (SSL Session)
Request attestation
Decrypt 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡)
Generate 𝐻( 𝐻 𝐼𝑛𝑓𝑒𝑐𝑡𝑒𝑑 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 )
Validate 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸 with CA
Extract 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 from 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸
Verify 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒
Verification failure
Send 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡, 𝐻 𝐻 𝐼𝑛𝑓𝑒𝑐𝑡𝑒𝑑 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒
& 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸
- 15 - Kyung Hee University
Mobile Embedded System Lab.
Security Analysis (4/6)
 Security Threats
 Firmware Replace Attack (Using Unauthorized FW Updater)
▶ Countermeasures) Secure Firmware Update
MS500-iSE Storage
(unauthorized)
Query 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝐶𝑢𝑟
Send 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤
Validate 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤
referring to 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 )
Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤))
Request 𝐹𝑊𝑁𝑒𝑤
Send 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐹𝑊𝑈𝑛𝑎𝑢𝑡ℎ𝑜𝑟𝑖𝑧𝑒𝑑)
Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑈𝑛𝑎𝑢𝑡ℎ𝑜𝑟𝑖𝑧𝑒𝑑)
Block update process
Validate 𝐹𝑊𝑁𝑒𝑤 and 𝐹𝑊𝑉𝑁𝑒𝑤
referring to 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝐹𝑊𝑁𝑒𝑤))  failed
- 16 - Kyung Hee University
Mobile Embedded System Lab.
Security Analysis (5/6)
 Security Threats
 Rollback Attack
▶ Countermeasures) Secure Firmware Update
MS500-iSE Storage
(outdated FW)
Query 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝐶𝑢𝑟
Send 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑂𝑙𝑑
Validate 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑂𝑙𝑑
referring to 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑂𝑙𝑑)
Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑂𝑙𝑑))
Request 𝐹𝑊𝑁𝑒𝑤
Send 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑂𝑙𝑑)
Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑂𝑙𝑑)
Validate 𝐹𝑊𝑂𝑙𝑑 and 𝐹𝑊𝑉𝑂𝑙𝑑
Referring to 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝐶𝑢𝑟)  failed
Block update process
- 17 - Kyung Hee University
Mobile Embedded System Lab.
Security Analysis (6/6)
 Security Threats
 Man in the Middle Attack
▶ Countermeasures) Remote Attestation
MS500-iSE
(Malicious FW)
Attestation
Server
Attestation request (SSL Session)
Request attestation
Decrypt 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡)
Generate 𝐻( 𝐻 𝑚𝑎𝑙𝑖𝑐𝑖𝑜𝑢𝑠 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 )
Sign 𝐻 𝐻 𝑚𝑎𝑙𝑖𝑐𝑖𝑜𝑢𝑠 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 using 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡
Send 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡, 𝐻 𝐻 𝑚𝑎𝑙𝑖𝑐𝑖𝑜𝑢𝑠 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 & 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸
Device verification
Validate 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑖𝑆𝐸 with CA
Invalid certificate
(Verification failure)
Intruder
(Attacker)
SSL Session
Request attestation
SSL Session
Send 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑎𝑐𝑘𝑒𝑟, 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 & 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝐴𝑡𝑡𝑎𝑐𝑘𝑒𝑟
- 18 - Kyung Hee University
Mobile Embedded System Lab.
Conclusion
 Conclusion
 Propose to necessity IoT device security platform based on
integrated security SoC
 Design and analyze security functions
 Future works
 Implement IoT device security platform based on integrated security
SoC
 Verify security functions
 Compare and analyze with security IoT device platform using
HSM(Hardware Security Module; TPM, SE)
- 19 - Kyung Hee University
Mobile Embedded System Lab.
QnA
- 20 - Kyung Hee University
Mobile Embedded System Lab.
Thank you

More Related Content

What's hot

Active / Active configurations with Oracle Active Data Guard
Active / Active configurations with Oracle Active Data GuardActive / Active configurations with Oracle Active Data Guard
Active / Active configurations with Oracle Active Data GuardAris Prassinos
 
Backup Options for IBM PureData for Analytics powered by Netezza
Backup Options for IBM PureData for Analytics powered by NetezzaBackup Options for IBM PureData for Analytics powered by Netezza
Backup Options for IBM PureData for Analytics powered by NetezzaTony Pearson
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And RecoveryWynthorpe
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2Mario Redón Luz
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)rajsandhu1989
 
Netezza workload management
Netezza workload managementNetezza workload management
Netezza workload managementBiju Nair
 
Datastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobsDatastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobsshanker_uma
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architectureVimlendu Kumar
 
Bigdata netezza-ppt-apr2013-bhawani nandan prasad
Bigdata netezza-ppt-apr2013-bhawani nandan prasadBigdata netezza-ppt-apr2013-bhawani nandan prasad
Bigdata netezza-ppt-apr2013-bhawani nandan prasadBhawani N Prasad
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storageKhaja Moiz Uddin
 
IBM Pure Data System for Analytics (Netezza)
IBM Pure Data System for Analytics (Netezza)IBM Pure Data System for Analytics (Netezza)
IBM Pure Data System for Analytics (Netezza)Girish Srivastava
 
Data Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformData Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformIJCSIS Research Publications
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing IJMER
 

What's hot (20)

Active / Active configurations with Oracle Active Data Guard
Active / Active configurations with Oracle Active Data GuardActive / Active configurations with Oracle Active Data Guard
Active / Active configurations with Oracle Active Data Guard
 
Backup Options for IBM PureData for Analytics powered by Netezza
Backup Options for IBM PureData for Analytics powered by NetezzaBackup Options for IBM PureData for Analytics powered by Netezza
Backup Options for IBM PureData for Analytics powered by Netezza
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Remote backup system
Remote backup systemRemote backup system
Remote backup system
 
Data Guard25 August
Data Guard25 AugustData Guard25 August
Data Guard25 August
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
 
Netezza All labs
Netezza All labsNetezza All labs
Netezza All labs
 
Netezza workload management
Netezza workload managementNetezza workload management
Netezza workload management
 
Data guard oracle
Data guard oracleData guard oracle
Data guard oracle
 
Datastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobsDatastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobs
 
Ds1 int (1)
Ds1 int (1)Ds1 int (1)
Ds1 int (1)
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Data guard architecture
Data guard architectureData guard architecture
Data guard architecture
 
Bigdata netezza-ppt-apr2013-bhawani nandan prasad
Bigdata netezza-ppt-apr2013-bhawani nandan prasadBigdata netezza-ppt-apr2013-bhawani nandan prasad
Bigdata netezza-ppt-apr2013-bhawani nandan prasad
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 
IBM Pure Data System for Analytics (Netezza)
IBM Pure Data System for Analytics (Netezza)IBM Pure Data System for Analytics (Netezza)
IBM Pure Data System for Analytics (Netezza)
 
Data Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformData Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux Platform
 
Tera data
Tera dataTera data
Tera data
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 

Similar to [KCC oral] 정준영

ZeroNights - SmartTV
ZeroNights - SmartTV ZeroNights - SmartTV
ZeroNights - SmartTV Sergey Belov
 
Computer System Oranization-R.D.Sivakumar
Computer System Oranization-R.D.SivakumarComputer System Oranization-R.D.Sivakumar
Computer System Oranization-R.D.SivakumarSivakumar R D .
 
SCC (Security Control Center)
SCC (Security Control Center)SCC (Security Control Center)
SCC (Security Control Center)Junyoung Jung
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
DEF CON 27 - ALI ISLAM and DAN REGALADO WEAPONIZING HYPERVISORS
DEF CON 27 - ALI ISLAM and DAN REGALADO WEAPONIZING HYPERVISORSDEF CON 27 - ALI ISLAM and DAN REGALADO WEAPONIZING HYPERVISORS
DEF CON 27 - ALI ISLAM and DAN REGALADO WEAPONIZING HYPERVISORSFelipe Prado
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術bv8af4
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kuniyasu Suzaki
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeRuchika Mehresh
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01wardell henley
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chanceDr. Anish Cheriyan (PhD)
 
iPhone and iPad Security
iPhone and iPad SecurityiPhone and iPad Security
iPhone and iPad SecuritySimon Guest
 
[Kcc poster] 정준영
[Kcc poster] 정준영[Kcc poster] 정준영
[Kcc poster] 정준영Junyoung Jung
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 

Similar to [KCC oral] 정준영 (20)

ZeroNights - SmartTV
ZeroNights - SmartTV ZeroNights - SmartTV
ZeroNights - SmartTV
 
Computer System Oranization-R.D.Sivakumar
Computer System Oranization-R.D.SivakumarComputer System Oranization-R.D.Sivakumar
Computer System Oranization-R.D.Sivakumar
 
SCC (Security Control Center)
SCC (Security Control Center)SCC (Security Control Center)
SCC (Security Control Center)
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
DEF CON 27 - ALI ISLAM and DAN REGALADO WEAPONIZING HYPERVISORS
DEF CON 27 - ALI ISLAM and DAN REGALADO WEAPONIZING HYPERVISORSDEF CON 27 - ALI ISLAM and DAN REGALADO WEAPONIZING HYPERVISORS
DEF CON 27 - ALI ISLAM and DAN REGALADO WEAPONIZING HYPERVISORS
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
50120130406041 2
50120130406041 250120130406041 2
50120130406041 2
 
資安控管實務技術
資安控管實務技術資安控管實務技術
資安控管實務技術
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
 
Test
TestTest
Test
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
iPhone and iPad Security
iPhone and iPad SecurityiPhone and iPad Security
iPhone and iPad Security
 
[Kcc poster] 정준영
[Kcc poster] 정준영[Kcc poster] 정준영
[Kcc poster] 정준영
 
OS tutoring #1
OS tutoring #1OS tutoring #1
OS tutoring #1
 
Tapping into the core
Tapping into the coreTapping into the core
Tapping into the core
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 

More from Junyoung Jung

전자석을 이용한 타자 연습기
전자석을 이용한 타자 연습기전자석을 이용한 타자 연습기
전자석을 이용한 타자 연습기Junyoung Jung
 
[2018 평창올림픽 기념 SW 공모전] Nolza 보고서
[2018 평창올림픽 기념 SW 공모전] Nolza 보고서[2018 평창올림픽 기념 SW 공모전] Nolza 보고서
[2018 평창올림픽 기념 SW 공모전] Nolza 보고서Junyoung Jung
 
[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service
[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service
[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation serviceJunyoung Jung
 
sauber92's Potfolio (ver.2012~2017)
sauber92's Potfolio (ver.2012~2017)sauber92's Potfolio (ver.2012~2017)
sauber92's Potfolio (ver.2012~2017)Junyoung Jung
 
Electron을 사용해서 Arduino 제어하기
Electron을 사용해서 Arduino 제어하기Electron을 사용해서 Arduino 제어하기
Electron을 사용해서 Arduino 제어하기Junyoung Jung
 
[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스
[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스
[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스Junyoung Jung
 
[우아주, Etc] 정준영 - 페이시스템
[우아주, Etc] 정준영 - 페이시스템[우아주, Etc] 정준영 - 페이시스템
[우아주, Etc] 정준영 - 페이시스템Junyoung Jung
 
[우아주, 7월] 정준영
[우아주, 7월] 정준영[우아주, 7월] 정준영
[우아주, 7월] 정준영Junyoung Jung
 
[team608] 전자석을 이용한 타자연습기
[team608] 전자석을 이용한 타자연습기[team608] 전자석을 이용한 타자연습기
[team608] 전자석을 이용한 타자연습기Junyoung Jung
 
[Graduation Project] 전자석을 이용한 타자 연습기
[Graduation Project] 전자석을 이용한 타자 연습기[Graduation Project] 전자석을 이용한 타자 연습기
[Graduation Project] 전자석을 이용한 타자 연습기Junyoung Jung
 
[KCC poster]정준영
[KCC poster]정준영[KCC poster]정준영
[KCC poster]정준영Junyoung Jung
 
16 학술제 마무리 자료
16 학술제 마무리 자료16 학술제 마무리 자료
16 학술제 마무리 자료Junyoung Jung
 
[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt
[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt
[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_pptJunyoung Jung
 
[2016 K-global 스마트디바이스톤] inSpot
[2016 K-global 스마트디바이스톤] inSpot[2016 K-global 스마트디바이스톤] inSpot
[2016 K-global 스마트디바이스톤] inSpotJunyoung Jung
 
[2015전자과공모전] ppt
[2015전자과공모전] ppt[2015전자과공모전] ppt
[2015전자과공모전] pptJunyoung Jung
 

More from Junyoung Jung (20)

전자석을 이용한 타자 연습기
전자석을 이용한 타자 연습기전자석을 이용한 타자 연습기
전자석을 이용한 타자 연습기
 
[2018 평창올림픽 기념 SW 공모전] Nolza 보고서
[2018 평창올림픽 기념 SW 공모전] Nolza 보고서[2018 평창올림픽 기념 SW 공모전] Nolza 보고서
[2018 평창올림픽 기념 SW 공모전] Nolza 보고서
 
[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service
[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service
[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service
 
Google File System
Google File SystemGoogle File System
Google File System
 
sauber92's Potfolio (ver.2012~2017)
sauber92's Potfolio (ver.2012~2017)sauber92's Potfolio (ver.2012~2017)
sauber92's Potfolio (ver.2012~2017)
 
Electron을 사용해서 Arduino 제어하기
Electron을 사용해서 Arduino 제어하기Electron을 사용해서 Arduino 제어하기
Electron을 사용해서 Arduino 제어하기
 
[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스
[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스
[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스
 
[우아주, Etc] 정준영 - 페이시스템
[우아주, Etc] 정준영 - 페이시스템[우아주, Etc] 정준영 - 페이시스템
[우아주, Etc] 정준영 - 페이시스템
 
[우아주, 7월] 정준영
[우아주, 7월] 정준영[우아주, 7월] 정준영
[우아주, 7월] 정준영
 
[team608] 전자석을 이용한 타자연습기
[team608] 전자석을 이용한 타자연습기[team608] 전자석을 이용한 타자연습기
[team608] 전자석을 이용한 타자연습기
 
[Graduation Project] 전자석을 이용한 타자 연습기
[Graduation Project] 전자석을 이용한 타자 연습기[Graduation Project] 전자석을 이용한 타자 연습기
[Graduation Project] 전자석을 이용한 타자 연습기
 
[KCC poster]정준영
[KCC poster]정준영[KCC poster]정준영
[KCC poster]정준영
 
16 학술제 마무리 자료
16 학술제 마무리 자료16 학술제 마무리 자료
16 학술제 마무리 자료
 
[Maybee] inSpot
[Maybee] inSpot[Maybee] inSpot
[Maybee] inSpot
 
[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt
[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt
[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt
 
[2016 K-global 스마트디바이스톤] inSpot
[2016 K-global 스마트디바이스톤] inSpot[2016 K-global 스마트디바이스톤] inSpot
[2016 K-global 스마트디바이스톤] inSpot
 
[2015전자과공모전] ppt
[2015전자과공모전] ppt[2015전자과공모전] ppt
[2015전자과공모전] ppt
 
[C++]6 function2
[C++]6 function2[C++]6 function2
[C++]6 function2
 
[C++]5 function
[C++]5 function[C++]5 function
[C++]5 function
 
[C++]4 review
[C++]4 review[C++]4 review
[C++]4 review
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

[KCC oral] 정준영

  • 1. - 1 - Mobile & Embedded System Lab. Dept. of Computer Engineering Kyung Hee Univ. Design of a IoT Device Security Platform based on Integrated Security SoC Presented by Junyoung Jung
  • 2. - 2 - Kyung Hee University Mobile Embedded System Lab. Motivation (1/2)  Recent Trends  Accelerated the launch of a variety of IoT products & services  Developed the COTS IoT device platform ▶ Raspberry Pi, Arduino, ESP8266, etc  Problems  COTS IoT device platform ▶ Low CPU, Small memory, Low cost chip/sensor ▶ Absence of Security functions  Existing Security technology (for Server/PC) ▶ Demand Large Memory and Fast computing power Difficult to apply Security functions to IoT device platform
  • 3. - 3 - Kyung Hee University Mobile Embedded System Lab. Motivation (2/2)  Hardware Security Module (Presented by oneM2M)  SE(Secure Elements) ▶ Ensure Data/Firmware integrity ▶ Require strong Authentication method  Isolated system’s Problems (Microprocess + SE)  Reverse Engineering attack ▶ Memory/SE de-soldering  Hardware Trojan attack ▶ Malicious hardware invasion Propose IoT device security platform based on Integrated Security SoC
  • 4. - 4 - Kyung Hee University Mobile Embedded System Lab. Related works (1/2)  Integrated Security SoC (eWBM MS500)  Security features ▶ Secure Key Management  Non Volatile Memory (eFuse) ▶ Secure Storage  Flash Memory ▶ Root of Trust  1st Bootloader ▶ Crypto Blocks  Symmetric Crypto Accelerator (AES, ARIA)  Asymmetric Crypto Accelerator (RSA, ECC)  True Random Number Generator
  • 5. - 5 - Kyung Hee University Mobile Embedded System Lab. Related works (2/2)  oneM2M Security Requirements (TS-0003. Security Solutions)  Access Management ▶ Using the encryption functions of the SE for data integrity ▶ Using the encryption functions of the SE for authentication  Security Administration ▶ Pre-provisioning of sensitive data to SE ▶ Management of sensitive data via secure channel  Sensitive Data Handling ▶ Secure storage of sensitive data using SE ▶ Secure management of sensitive data using SE
  • 6. - 6 - Kyung Hee University Mobile Embedded System Lab. Proposed System (1/6)  Security functions ① Secure Key Storage & Management ▶ Ensure availability of sensitive data(e.g., Encryption key) ▶ Correspondence) Sensitive Data Handling ② Secure Boot ▶ Verify firmware integrity ▶ Correspondence) Access Management ③ Secure Firmware Update ▶ Ensure safety of firmware update ▶ Correspondence) Access Management, Sensitive Data Handling ④ Secure Communication ▶ Ensure secure channel of device-to-device communication ▶ Correspondence) Security Administration ⑤ Remote Attestation ▶ Verify device trust ▶ Correspondence) Access Management, Security Administration
  • 7. - 7 - Kyung Hee University Mobile Embedded System Lab. Proposed System (2/6)  Secure Key Storage & Management MS500-iSE BootROM 1 𝑠𝑡 𝐵𝐿 eFuse 𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚 𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 TRNG (True Random Number Generator) ACA (Asymmetric Crypto Accelerator) SCA (Symmetric Crypto Accelerator) Flash Memory Public Section 2 𝑛𝑑 𝐵𝐿 𝐹𝑊𝐶𝑢𝑟 Private Section 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝐶𝑢𝑟) 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝐹𝑊𝑉𝐶𝑢𝑟) 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡) 𝐶𝑒𝑟𝑡𝑖𝑆𝐸 < Data Encrypt method >
  • 8. - 8 - Kyung Hee University Mobile Embedded System Lab. Proposed System (3/6)  Secure Boot < System Architecture > < Sequence Diagram > MS500-iSE 1 𝑠𝑡 𝐵𝐿 2 𝑛𝑑 𝐵𝐿 𝐹𝑊 Verify 2 𝑛𝑑 𝐵𝐿 ( In: 2 𝑛𝑑 𝐵𝐿 𝑀𝐴𝐶, 𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚 ) Transfer control to 2 𝑛𝑑 𝐵𝐿 MS500-iSE BootROM eFuse 1 𝑠𝑡 𝐵𝐿 (includes 2 𝑛𝑑 𝐵𝐿 𝑀𝐴𝐶) 𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚 Flash Private Section 𝐶𝑒𝑟𝑡𝑖𝑆𝐸 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡) 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝐶𝑢𝑟)) 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝐶𝑢𝑟) 𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 Public Section 𝐹𝑊 2 𝑛𝑑 𝐵𝐿 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 𝑆𝑖𝑔𝑛 𝐶𝐴 Verify 𝐹𝑊 ( Compare 𝐻(𝐹𝑊) and 𝐻(𝐹𝑊𝐶𝑢𝑟) ) Extract 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝐶𝑢𝑟)) ( referring to 𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟 ) Transfer control to 𝐹𝑊𝐶𝑢𝑟 Compute 𝐻(𝐹𝑊)
  • 9. - 9 - Kyung Hee University Mobile Embedded System Lab. Proposed System (4/6)  Secure Firmware Update < Sequence Diagram > MS500-iSE Storage FW Author Upload 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 Upload 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑁𝑒𝑤) Query 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝐶𝑢𝑟 Send 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 Validate 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 referring to 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 ) Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤)) Request 𝐹𝑊𝑁𝑒𝑤 Send 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐹𝑊𝑁𝑒𝑤) Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑁𝑒𝑤) Store 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 ( 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝑁𝑒𝑤), 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝑁𝑒𝑤)) ) Store 𝐹𝑊𝑁𝑒𝑤 Validate 𝐹𝑊𝑁𝑒𝑤 and 𝐹𝑊𝑉𝑁𝑒𝑤 Create 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 Reboot (Normal Boot, where BL2 replaces 𝐹𝑊𝐶𝑢𝑟 with 𝐹𝑊𝑁𝑒𝑤) Reboot (Secure Boot) 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 𝐹𝑊𝑉𝑁𝑒𝑤 (Firmware Version) 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝐹𝑊𝑁𝑒𝑤)) 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤)) Sign 𝐹𝑊 𝑁𝑒𝑤 MS500-iSE eFuse 𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 Flash Private Section 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝐶𝑢𝑟) 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝑁𝑒𝑤) 𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝐶𝑢𝑟)) 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝑁𝑒𝑤)) Public Section 𝑂𝑢𝑡𝑑𝑎𝑡𝑒𝑑 𝐹𝑊 𝑁𝑒𝑤 𝐹𝑊
  • 10. - 10 - Kyung Hee University Mobile Embedded System Lab. Proposed System (5/6)  Secure Communication Message Exchange SSL Handshake MS500-iSE (mbedTLS-based) Server (OpenSSL-based) Hello message Send 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑆𝑒𝑟𝑣𝑒𝑟 Send 𝐸(𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟 , 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛) Encrypted message (𝐸(𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛, 𝐷𝑎𝑡𝑎) ) TCP/IP Connection Extract 𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟 in 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑆𝑒𝑟𝑣𝑒𝑟 Encrypt 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛 using 𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟 Decrypt 𝐸(𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟, 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛) < Sequence diagram > Server OpenSSL-based service 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛 Storage 𝑃𝑟𝑖𝐾𝑆𝑒𝑟𝑣𝑒𝑟 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑆𝑒𝑟𝑣𝑒𝑟 Generate 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛 MS500-iSE Flash Public Section 𝐹𝑊 mbedTLS Library SRAM 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝑆𝑒𝑟𝑣𝑒𝑟 𝑆ℎ𝑑𝐾𝑠𝑒𝑠𝑠𝑖𝑜𝑛 𝑃𝑢𝑏𝐾𝑆𝑒𝑟𝑣𝑒𝑟
  • 11. - 11 - Kyung Hee University Mobile Embedded System Lab. Proposed System (6/6)  Remote Attestation Device verification Device provisioning Attestation request (SSL Session) MS500-iSE Attestation Server Certificate Authority FW Author 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 Publish 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝐶𝐴 Generate Certificate Send 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸, 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡 Request attestation Decrypt 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡) Generate 𝐻( 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 ) Send 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 Sign 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 using 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡 Send 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡, 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 & 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸 Verify 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸 Decrypt 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡, 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 using 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 Extract 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 from 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸 Verify 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 Success MS500-iSE eFuse 𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 Flash Private Section 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡) 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝐶𝐴 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 𝑆𝑖𝑔𝑛 𝐶𝐴 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 Public Section 𝐹𝑊
  • 12. - 12 - Kyung Hee University Mobile Embedded System Lab. Security Analysis (1/6)  Security Threats  Bootloader Replace Attack  Firmware Replace Attack  Rollback Attack  Man in the Middle Attack
  • 13. - 13 - Kyung Hee University Mobile Embedded System Lab. Security Analysis (2/6)  Security Threats  Bootloader Replace Attack ▶ Countermeasures) Secure Boot MS500-iSE 𝐹𝑊𝐶𝑢𝑟𝑀𝑜𝑑𝑖𝑓𝑖𝑒𝑑 2 𝑛𝑑 𝐵𝐿1 𝑠𝑡 𝐵𝐿 Verify 2 𝑛𝑑 𝐵𝐿 ( In: 2 𝑛𝑑 𝐵𝐿 𝑀𝐴𝐶, 𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚 ) Infected boot ( Halt boot process )
  • 14. - 14 - Kyung Hee University Mobile Embedded System Lab. Security Analysis (3/6)  Security Threats  Firmware Replace Attack ▶ Countermeasures) Secure Boot, Remote Attestation Verify 2 𝑛𝑑 𝐵𝐿 ( In: 2 𝑛𝑑 𝐵𝐿 𝑀𝐴𝐶, 𝑆ℎ𝑑𝐾 𝑃𝑙𝑎𝑡𝑓𝑜𝑟𝑚 ) Transfer control to 2 𝑛𝑑 𝐵𝐿 Extract 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐻(𝐹𝑊𝐶𝑢𝑟)) ( referring to 𝑃𝑢𝑏𝐾𝐴𝑢𝑡ℎ𝑜𝑟) Compute 𝐻(𝐹𝑊) MS500-iSE 𝑀𝑜𝑑𝑖𝑓𝑖𝑒𝑑 𝐹𝑊2 𝑛𝑑 𝐵𝐿1 𝑠𝑡 𝐵𝐿 Infected boot ( Halt boot process ) Verify 𝐹𝑊 ( Compare 𝐻(𝐹𝑊) and 𝐻(𝐹𝑊𝐶𝑢𝑟) ) MS500-iSE (Infected FW) Attestation Server Device verification Attestation request (SSL Session) Request attestation Decrypt 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡) Generate 𝐻( 𝐻 𝐼𝑛𝑓𝑒𝑐𝑡𝑒𝑑 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 ) Validate 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸 with CA Extract 𝑃𝑢𝑏𝐾𝐴𝑡𝑡𝑒𝑠𝑡 from 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸 Verify 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 Verification failure Send 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡, 𝐻 𝐻 𝐼𝑛𝑓𝑒𝑐𝑡𝑒𝑑 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 & 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸
  • 15. - 15 - Kyung Hee University Mobile Embedded System Lab. Security Analysis (4/6)  Security Threats  Firmware Replace Attack (Using Unauthorized FW Updater) ▶ Countermeasures) Secure Firmware Update MS500-iSE Storage (unauthorized) Query 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝐶𝑢𝑟 Send 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 Validate 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 referring to 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤 ) Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑁𝑒𝑤)) Request 𝐹𝑊𝑁𝑒𝑤 Send 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐹𝑊𝑈𝑛𝑎𝑢𝑡ℎ𝑜𝑟𝑖𝑧𝑒𝑑) Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑈𝑛𝑎𝑢𝑡ℎ𝑜𝑟𝑖𝑧𝑒𝑑) Block update process Validate 𝐹𝑊𝑁𝑒𝑤 and 𝐹𝑊𝑉𝑁𝑒𝑤 referring to 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝐹𝑊𝑁𝑒𝑤))  failed
  • 16. - 16 - Kyung Hee University Mobile Embedded System Lab. Security Analysis (5/6)  Security Threats  Rollback Attack ▶ Countermeasures) Secure Firmware Update MS500-iSE Storage (outdated FW) Query 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝐶𝑢𝑟 Send 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑂𝑙𝑑 Validate 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑂𝑙𝑑 referring to 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑂𝑙𝑑) Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟, 𝐻(𝑀𝑎𝑛𝑖𝑓𝑒𝑠𝑡 𝑂𝑙𝑑)) Request 𝐹𝑊𝑁𝑒𝑤 Send 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑂𝑙𝑑) Decrypt 𝑆𝑖𝑔𝑛(𝑃𝑟𝑖𝐾𝐴𝑢𝑡ℎ𝑜𝑟 , 𝐹𝑊𝑂𝑙𝑑) Validate 𝐹𝑊𝑂𝑙𝑑 and 𝐹𝑊𝑉𝑂𝑙𝑑 Referring to 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒, 𝐹𝑊𝑉𝐶𝑢𝑟)  failed Block update process
  • 17. - 17 - Kyung Hee University Mobile Embedded System Lab. Security Analysis (6/6)  Security Threats  Man in the Middle Attack ▶ Countermeasures) Remote Attestation MS500-iSE (Malicious FW) Attestation Server Attestation request (SSL Session) Request attestation Decrypt 𝐸(𝑆ℎ𝑑𝐾 𝐷𝑒𝑣𝑖𝑐𝑒 , 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡) Generate 𝐻( 𝐻 𝑚𝑎𝑙𝑖𝑐𝑖𝑜𝑢𝑠 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 ) Sign 𝐻 𝐻 𝑚𝑎𝑙𝑖𝑐𝑖𝑜𝑢𝑠 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 using 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡 Send 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑒𝑠𝑡, 𝐻 𝐻 𝑚𝑎𝑙𝑖𝑐𝑖𝑜𝑢𝑠 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 & 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒𝑖𝑆𝐸 Device verification Validate 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑖𝑆𝐸 with CA Invalid certificate (Verification failure) Intruder (Attacker) SSL Session Request attestation SSL Session Send 𝑆𝑖𝑔𝑛 𝑃𝑟𝑖𝐾𝐴𝑡𝑡𝑎𝑐𝑘𝑒𝑟, 𝐻 𝐻 𝐹𝑊 ⊕ 𝐼𝐷 𝐷𝑒𝑣𝑖𝑐𝑒 & 𝐶𝑒𝑟𝑡𝑖𝑓𝑖𝑐𝑎𝑡𝑒 𝐴𝑡𝑡𝑎𝑐𝑘𝑒𝑟
  • 18. - 18 - Kyung Hee University Mobile Embedded System Lab. Conclusion  Conclusion  Propose to necessity IoT device security platform based on integrated security SoC  Design and analyze security functions  Future works  Implement IoT device security platform based on integrated security SoC  Verify security functions  Compare and analyze with security IoT device platform using HSM(Hardware Security Module; TPM, SE)
  • 19. - 19 - Kyung Hee University Mobile Embedded System Lab. QnA
  • 20. - 20 - Kyung Hee University Mobile Embedded System Lab. Thank you