SlideShare a Scribd company logo
1 of 19
Download to read offline
Open / Non-NDA v 33 slide # 1 Kinzinger Automation GmbH
Klaus Kinzinger, kinzinger@kinzinger.de
Joint European
Security Initiative
M2M Summit in Cologne, 11th October 2017
Open / Non-NDA v 33 slide # 2 Kinzinger Automation GmbH
A non-NDA Teaser
Open / Non-NDA v 33 slide # 3 Kinzinger Automation GmbH
Intro
There exists a clean solution
for the problem of cybersecurity. It is
straightforward, clear,
complete, formally provable and thus
qualifies for certification according
to the highest IT security standards
JESI SCCT will supply this solution to the IoT,
Industry 4.0 and critical infrastructures market.
This technology will be used by everyone who
builds mission critical systems of any kind.
Open / Non-NDA v 33 slide # 4 Kinzinger Automation GmbH
Objectives
General purpose, fully scalable processor IP with
1. Certified and reliable cybersecurity
(task level security features guaranteed by HW)
2. Certified and reliable safety / protection of
control flow – CFI (programs cannot crash)
memory access (smart pointers in HW)
3. Superior energy efficiency and performance
Open / Non-NDA v 33 slide # 5 Kinzinger Automation GmbH
Basics
IT security is an architectural feature and no add-on.
One can not mount or reliably glue it onto hardware
that by design has no support for it (von Neumann)
A major technology leap is needed that ought to
start with critical infrastructures and then should
expand into the mass markets
For economic reasons, in the mass markets
energy efficiency is paramount for success
Open / Non-NDA v 33 slide # 6 Kinzinger Automation GmbH
Chain of Trust ?
IT security can not exist
without proper hardware anchoring
It never has and never will
Open / Non-NDA v 33 slide # 7 Kinzinger Automation GmbH
Von Neumann Architecture – Benefits
1945 – unlimited software freedom (one task at a time):
code ≡ data => self-modifying code
unified memory => random code/data memory access
=
?
VNA in 1945 – EDVAC VNA in 2017 – Intel Chip
?
Open / Non-NDA v 33 slide # 8 Kinzinger Automation GmbH
Von Neumann Architecture – Hazards
2017 – unlimited malware freedom (multitasking, internet):
code ≡ data => code injection, arbitrary code exec
unified memory => computer espionage / sabotage etc.
=
?
VNA in 1945 – EDVAC VNA in 2017 – Intel Chip
?
Open / Non-NDA v 33 slide # 9 Kinzinger Automation GmbH
Exploit of a SW Bug
Attacker triggers SW crash
ChainofTrust
Layer
Layer
Layer
Layer
Exploit bypasses
the whole software stack
(and any "chain of trust")
Control flow is hijacked
and directed to machine code
injected or selected (ROP)
by the attacker
Technology Stack
Cyber attack
classic
von Neumann CPU
(no security)
OS: Tasks, MMU
ISA
(HW/SW Interface)
Application Attacker takes over control
At ISA level, the system
is unguarded and an easy prey
Open / Non-NDA v 33 slide # 10 Kinzinger Automation GmbH
Cyberdefense – Option 1 – Quality Assurance
no bug no hack
"Security by bug-free coding"
(a popular illusion)
"Security by bug-fix"
(hopeless, e.g. Microsoft)
"Security by hunting malware"
(hopeless, e.g. Symantec)
Prevent the attack
Technology Stack
Cyber attack
classic
von Neumann CPU
(no security)
OS: Tasks, MMU
ISA
(HW/SW Interface)
Application
ChainofTrust
Layer
Layer
Layer
Layer
Open / Non-NDA v 33 slide # 11 Kinzinger Automation GmbH
Cyberdefense – Option 2 – VNA Tuning
HW options are restricted by
legacy code compatibility needs
... good concept, but
ChainofTrust
Layer
Layer
Layer
Layer
Technology Stack
Cyber attack
tuned
von Neumann CPU
(some security)
OS: Tasks, MMU
ISA
(HW/SW Interface)
Application
Guard the impact point
"Security by NX-Bit"
(only partial solution)
"Security by Stack Canaries"
(only partial solution)
"Security by Shadow Stack"
(CET - Wintel's new idea,
again: partial solution)
Open / Non-NDA v 33 slide # 12 Kinzinger Automation GmbH
Cyberdefense – Option 3 – Secure ISA
Technology Stack
VISA
(HW/SW Interface)
Cybersecure Virtual ISA
butterfly CPU
(full security)
Layer
Layer
OS: Tasks, MMU
Cyber attack
Application
ChainofTrust
Layer
Withdraw all computer
linguistic means needed to
program / perform the attack
at machine code level
Layer
Open / Non-NDA v 33 slide # 13 Kinzinger Automation GmbH
Joint European
Security Initiative
Open / Non-NDA v 33 slide # 14 Kinzinger Automation GmbH
Mission – European Secure ICT Standard
JESI develops a new cybersecure processor type
Based on a solid theoretical framework, its novel computing
core IP, OS components, algorithms, and communication
protocols define a future European Secure ICT Standard
providing reliable cybersecurity against
all kinds of malware, ransomware, viruses, worms,
and Trojan horses that exploit coding errors, and
most types of backdoors and key escrow implanted
into SW or HW by non-EU manufacturers
Open / Non-NDA v 33 slide # 15 Kinzinger Automation GmbH
Main Use Cases
Based on the results of the JESI foundation project
SCCT – Secure Computing Core Technology – three
JESI subprojects implement use cases of primary interest
SVCT Secure Vehicular Communications Technology
(networked environments in car / train / aircraft,
and in stationary communications infrastructures)
SIAT Secure Industrial Automation Technology
(Industry 4.0, IoT, "secure PLC" and so on)
SHPC Secure High Performance Computing
(data center & cloud computing)
Open / Non-NDA v 33 slide # 16 Kinzinger Automation GmbH
Timeline
Cybersecurity at highest JESI level is urgently
needed to protect people, nations, and industries
around the world from the impact of cyber espionage,
sabotage, warfare, and terrorism. It is also vital for
future digitalisation projects like Industry 4.0 and IoT
JESI is therefore planned to deliver ASAP
April, 2018 – submission to Horizon 2020
September/October 2018 – Project start
30 Months – Duration. Results: prototypes
Open / Non-NDA v 33 slide # 17 Kinzinger Automation GmbH
Partner per type per country per subproject
AKKA IND SVCT Kinzinger SME SCCT Ficosa IND SVCT
Bertrandt IND SVCT/SHPC FZI RTO SCCT Innovalia RTO SVCT
CEA RTO SVCT TUD Uni SCCT Eneo SME SVCT
INRIA RTO SVCT KIT Uni SIAT Nextel SME SVCT
ESIEE Uni SVCT HAW Uni SCCT SQS SME SVCT
Eurecom RTO SVCT Ikusi SME SVCT
Montimage SME SVCT UAB Uni SCCT/SHPC
Quirinus SME SVCT/SHPC
YoGoKo SME SVCT
SW Mobile SME SVCT
F-AR RTO SIAT
IMEC RTO SCCT JKU Uni SCCT
KU Leuven Uni SCCT Beia SME SVCT Yagoba SME SCCT
Germany
South Korea
Romania
Austria
SpainFrance
Belgium
Open / Non-NDA v 33 slide # 18 Kinzinger Automation GmbH
Benefits for JESI Industry Partners
JESI is bound to cause a major disruption
of all mission critical ICT markets because ...
ICT operators in critical application domains will run
legal liability risks in case of damage or casualties
caused by standard insecure ICT – as soon as secure
solutions are available on the market they may be held
legally accountable for not using them
For JESI industry partners, this additional legal aspect
is a winning game. They will be first in the evolving high
security ICT market and benefit from more than two years
technology lead in the SVCT, SIAT, and SHPC domains
Open / Non-NDA v 33 slide # 19 Kinzinger Automation GmbH
Call for Industry Partners
LE partners with the following profiles / roles are sought:
Automotive, train, avionics manufacturers
or their component suppliers, e.g. SEAT, Bosch,
Thales, Airbus
Industrial automation suppliers with specific interest
in Industry 4.0 and IoT, e.g. Siemens, Bosch, ABB
Industry partners looking for strategic investment
into an European ARM-like technology IP provider

More Related Content

What's hot

SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...Nabil Bouzerna
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateSODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateNabil Bouzerna
 
Highly customizable video surveillance platform for manufactures and system ...
Highly customizable  video surveillance platform for manufactures and system ...Highly customizable  video surveillance platform for manufactures and system ...
Highly customizable video surveillance platform for manufactures and system ...Nikolai Ptitsyn
 
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...Nabil Bouzerna
 
Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...Nabil Bouzerna
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_webLorenzo Beccacece
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon LibraryFortinet
 
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...Nabil Bouzerna
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?Alan Tatourian
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustTalea Consulting Srl
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesteam-WIBU
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
mbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connectormbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connectorarmmbed
 

What's hot (20)

SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateSODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
 
Highly customizable video surveillance platform for manufactures and system ...
Highly customizable  video surveillance platform for manufactures and system ...Highly customizable  video surveillance platform for manufactures and system ...
Highly customizable video surveillance platform for manufactures and system ...
 
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
 
Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_web
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
mbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connectormbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connector
 

Similar to Secure Computing Core Technology - A non-NDA Teaser

Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-enVahid RG-zadeh
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackersteam-WIBU
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-howteam-WIBU
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System SecurityAdel Barkam
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgL. Duke Golden
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure CybersecurityLogitek Solutions
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemmbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemarmmbed
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 
Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of ThingsIRJET Journal
 
IRJET- Cyber Attacks on Smart Cars using SDR
IRJET-  	  Cyber Attacks on Smart Cars using SDRIRJET-  	  Cyber Attacks on Smart Cars using SDR
IRJET- Cyber Attacks on Smart Cars using SDRIRJET Journal
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Advanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationAdvanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationInfineon Technologies AG
 

Similar to Secure Computing Core Technology - A non-NDA Teaser (20)

Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackers
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemmbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of Things
 
IRJET- Cyber Attacks on Smart Cars using SDR
IRJET-  	  Cyber Attacks on Smart Cars using SDRIRJET-  	  Cyber Attacks on Smart Cars using SDR
IRJET- Cyber Attacks on Smart Cars using SDR
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Advanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationAdvanced and Low-Complexity Authentication
Advanced and Low-Complexity Authentication
 

More from M2M Alliance e.V.

Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0M2M Alliance e.V.
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - OverviewM2M Alliance e.V.
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentM2M Alliance e.V.
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...M2M Alliance e.V.
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System M2M Alliance e.V.
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsM2M Alliance e.V.
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business AdvantageM2M Alliance e.V.
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology M2M Alliance e.V.
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingM2M Alliance e.V.
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living M2M Alliance e.V.
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation M2M Alliance e.V.
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...M2M Alliance e.V.
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsM2M Alliance e.V.
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesM2M Alliance e.V.
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteM2M Alliance e.V.
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthM2M Alliance e.V.
 

More from M2M Alliance e.V. (20)

M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
 
Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - Overview
 
VR Industry Solutions
VR Industry Solutions VR Industry Solutions
VR Industry Solutions
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M Environment
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory Applications
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business Advantage
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device Hacking
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of Things
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future Revenues
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from Remote
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential Growth
 
Vodafone Internet of Things
Vodafone Internet of ThingsVodafone Internet of Things
Vodafone Internet of Things
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Secure Computing Core Technology - A non-NDA Teaser

  • 1. Open / Non-NDA v 33 slide # 1 Kinzinger Automation GmbH Klaus Kinzinger, kinzinger@kinzinger.de Joint European Security Initiative M2M Summit in Cologne, 11th October 2017
  • 2. Open / Non-NDA v 33 slide # 2 Kinzinger Automation GmbH A non-NDA Teaser
  • 3. Open / Non-NDA v 33 slide # 3 Kinzinger Automation GmbH Intro There exists a clean solution for the problem of cybersecurity. It is straightforward, clear, complete, formally provable and thus qualifies for certification according to the highest IT security standards JESI SCCT will supply this solution to the IoT, Industry 4.0 and critical infrastructures market. This technology will be used by everyone who builds mission critical systems of any kind.
  • 4. Open / Non-NDA v 33 slide # 4 Kinzinger Automation GmbH Objectives General purpose, fully scalable processor IP with 1. Certified and reliable cybersecurity (task level security features guaranteed by HW) 2. Certified and reliable safety / protection of control flow – CFI (programs cannot crash) memory access (smart pointers in HW) 3. Superior energy efficiency and performance
  • 5. Open / Non-NDA v 33 slide # 5 Kinzinger Automation GmbH Basics IT security is an architectural feature and no add-on. One can not mount or reliably glue it onto hardware that by design has no support for it (von Neumann) A major technology leap is needed that ought to start with critical infrastructures and then should expand into the mass markets For economic reasons, in the mass markets energy efficiency is paramount for success
  • 6. Open / Non-NDA v 33 slide # 6 Kinzinger Automation GmbH Chain of Trust ? IT security can not exist without proper hardware anchoring It never has and never will
  • 7. Open / Non-NDA v 33 slide # 7 Kinzinger Automation GmbH Von Neumann Architecture – Benefits 1945 – unlimited software freedom (one task at a time): code ≡ data => self-modifying code unified memory => random code/data memory access = ? VNA in 1945 – EDVAC VNA in 2017 – Intel Chip ?
  • 8. Open / Non-NDA v 33 slide # 8 Kinzinger Automation GmbH Von Neumann Architecture – Hazards 2017 – unlimited malware freedom (multitasking, internet): code ≡ data => code injection, arbitrary code exec unified memory => computer espionage / sabotage etc. = ? VNA in 1945 – EDVAC VNA in 2017 – Intel Chip ?
  • 9. Open / Non-NDA v 33 slide # 9 Kinzinger Automation GmbH Exploit of a SW Bug Attacker triggers SW crash ChainofTrust Layer Layer Layer Layer Exploit bypasses the whole software stack (and any "chain of trust") Control flow is hijacked and directed to machine code injected or selected (ROP) by the attacker Technology Stack Cyber attack classic von Neumann CPU (no security) OS: Tasks, MMU ISA (HW/SW Interface) Application Attacker takes over control At ISA level, the system is unguarded and an easy prey
  • 10. Open / Non-NDA v 33 slide # 10 Kinzinger Automation GmbH Cyberdefense – Option 1 – Quality Assurance no bug no hack "Security by bug-free coding" (a popular illusion) "Security by bug-fix" (hopeless, e.g. Microsoft) "Security by hunting malware" (hopeless, e.g. Symantec) Prevent the attack Technology Stack Cyber attack classic von Neumann CPU (no security) OS: Tasks, MMU ISA (HW/SW Interface) Application ChainofTrust Layer Layer Layer Layer
  • 11. Open / Non-NDA v 33 slide # 11 Kinzinger Automation GmbH Cyberdefense – Option 2 – VNA Tuning HW options are restricted by legacy code compatibility needs ... good concept, but ChainofTrust Layer Layer Layer Layer Technology Stack Cyber attack tuned von Neumann CPU (some security) OS: Tasks, MMU ISA (HW/SW Interface) Application Guard the impact point "Security by NX-Bit" (only partial solution) "Security by Stack Canaries" (only partial solution) "Security by Shadow Stack" (CET - Wintel's new idea, again: partial solution)
  • 12. Open / Non-NDA v 33 slide # 12 Kinzinger Automation GmbH Cyberdefense – Option 3 – Secure ISA Technology Stack VISA (HW/SW Interface) Cybersecure Virtual ISA butterfly CPU (full security) Layer Layer OS: Tasks, MMU Cyber attack Application ChainofTrust Layer Withdraw all computer linguistic means needed to program / perform the attack at machine code level Layer
  • 13. Open / Non-NDA v 33 slide # 13 Kinzinger Automation GmbH Joint European Security Initiative
  • 14. Open / Non-NDA v 33 slide # 14 Kinzinger Automation GmbH Mission – European Secure ICT Standard JESI develops a new cybersecure processor type Based on a solid theoretical framework, its novel computing core IP, OS components, algorithms, and communication protocols define a future European Secure ICT Standard providing reliable cybersecurity against all kinds of malware, ransomware, viruses, worms, and Trojan horses that exploit coding errors, and most types of backdoors and key escrow implanted into SW or HW by non-EU manufacturers
  • 15. Open / Non-NDA v 33 slide # 15 Kinzinger Automation GmbH Main Use Cases Based on the results of the JESI foundation project SCCT – Secure Computing Core Technology – three JESI subprojects implement use cases of primary interest SVCT Secure Vehicular Communications Technology (networked environments in car / train / aircraft, and in stationary communications infrastructures) SIAT Secure Industrial Automation Technology (Industry 4.0, IoT, "secure PLC" and so on) SHPC Secure High Performance Computing (data center & cloud computing)
  • 16. Open / Non-NDA v 33 slide # 16 Kinzinger Automation GmbH Timeline Cybersecurity at highest JESI level is urgently needed to protect people, nations, and industries around the world from the impact of cyber espionage, sabotage, warfare, and terrorism. It is also vital for future digitalisation projects like Industry 4.0 and IoT JESI is therefore planned to deliver ASAP April, 2018 – submission to Horizon 2020 September/October 2018 – Project start 30 Months – Duration. Results: prototypes
  • 17. Open / Non-NDA v 33 slide # 17 Kinzinger Automation GmbH Partner per type per country per subproject AKKA IND SVCT Kinzinger SME SCCT Ficosa IND SVCT Bertrandt IND SVCT/SHPC FZI RTO SCCT Innovalia RTO SVCT CEA RTO SVCT TUD Uni SCCT Eneo SME SVCT INRIA RTO SVCT KIT Uni SIAT Nextel SME SVCT ESIEE Uni SVCT HAW Uni SCCT SQS SME SVCT Eurecom RTO SVCT Ikusi SME SVCT Montimage SME SVCT UAB Uni SCCT/SHPC Quirinus SME SVCT/SHPC YoGoKo SME SVCT SW Mobile SME SVCT F-AR RTO SIAT IMEC RTO SCCT JKU Uni SCCT KU Leuven Uni SCCT Beia SME SVCT Yagoba SME SCCT Germany South Korea Romania Austria SpainFrance Belgium
  • 18. Open / Non-NDA v 33 slide # 18 Kinzinger Automation GmbH Benefits for JESI Industry Partners JESI is bound to cause a major disruption of all mission critical ICT markets because ... ICT operators in critical application domains will run legal liability risks in case of damage or casualties caused by standard insecure ICT – as soon as secure solutions are available on the market they may be held legally accountable for not using them For JESI industry partners, this additional legal aspect is a winning game. They will be first in the evolving high security ICT market and benefit from more than two years technology lead in the SVCT, SIAT, and SHPC domains
  • 19. Open / Non-NDA v 33 slide # 19 Kinzinger Automation GmbH Call for Industry Partners LE partners with the following profiles / roles are sought: Automotive, train, avionics manufacturers or their component suppliers, e.g. SEAT, Bosch, Thales, Airbus Industrial automation suppliers with specific interest in Industry 4.0 and IoT, e.g. Siemens, Bosch, ABB Industry partners looking for strategic investment into an European ARM-like technology IP provider