SlideShare a Scribd company logo
1 of 16
Download to read offline
© 2021 NeuroBinder, Inc.
Secure Hardware Architecture
for Embedded Vision
Jonathan Cefalu
CEO, NeuroBinder, Inc.
© 2021 NeuroBinder, Inc.
We Need to Take Advanced Hackers More Seriously
2
• Hackers are much more skilled than most
product engineers give them credit for.
• This leads to camera-based products
repeatedly getting hacked, and a growing
societal distrust of cameras in general.
• To protect our customers, we need to
change our mindset and find an
embedded vision hardware architecture
that makes it electrically impossible for a
hacker to get access to live video.
© 2021 NeuroBinder, Inc.
We Need to Take Advanced Hackers More Seriously
3
• Hackers are much more skilled than most
product engineers give them credit for.
• This leads to camera-based products
repeatedly getting hacked, and a growing
societal distrust of cameras in general.
• To protect our customers, we need to
change our mindset and find an
embedded vision hardware architecture
that makes it electrically impossible for a
hacker to get access to live video.
© 2021 NeuroBinder, Inc.
We Need to Take Advanced Hackers More Seriously
4
• Hackers are much more skilled than most
product engineers give them credit for.
• This leads to camera-based products
repeatedly getting hacked, and a growing
societal distrust of cameras in general.
• To protect our customers, we need to
change our mindset and find an
embedded vision hardware architecture
that makes it electrically impossible for a
hacker to get access to live video.
© 2021 NeuroBinder, Inc.
Key Concepts
5
Vision Processor
(e.g. a CNN accelerator
or a chip like Movidius)
• Camera imagery flows from the camera(s) to a
dedicated vision processor (e.g. a CNN
accelerator or other embedded vision chip).
• The vision processor converts the camera
imagery into metadata such as e.g. the names of
objects in the scene, and the bounding box of
each object.
MIPI bus (high
bandwidth)
1 or more
cameras
© 2021 NeuroBinder, Inc.
Key Concept: Restrict Bandwidth of Output Bus
6
Vision Processor
(e.g. a CNN accelerator
or a chip like Movidius)
• The vision processor is wired so as to have its
only output interfaces be very low bandwidth
(e.g. only SPI) which are intentionally incapable
of streaming camera frames.
• The metadata that the vision processor
generates is outputted via JSON or a similar
representation over the low-bandwidth output
ports.
• Since no high-bandwidth output ports exist,
even if the vision processor were hacked,
it cannot leak live video to the outside world.
MIPI bus (high
bandwidth)
1 or more
cameras
Output from Vision Processor = low-bandwidth serial bus (e.g.
SPI) carrying metadata only.
E.g.: JSON list of detected objects’ names & bounding boxes.
© 2021 NeuroBinder, Inc.
Key Concept: Firebreak = 1-way Data Diode
7
Vision Processor
(e.g. a CNN accelerator
or a chip like Movidius)
Output from Vision Processor = low-bandwidth serial bus (e.g.
SPI) carrying metadata only.
E.g.: JSON list of detected objects’ names & bounding boxes.
MIPI bus (high
bandwidth)
1 or more
cameras
Application Processor
(Linux or Android, etc.)
© 2021 NeuroBinder, Inc.
Key Concept: Firebreak = 1-way Data Diode
8
Vision Processor
(e.g. a CNN accelerator
or a chip like Movidius)
Output from Vision Processor = low-bandwidth serial bus (e.g.
SPI) carrying metadata only.
E.g.: JSON list of detected objects’ names & bounding boxes.
MIPI bus (high
bandwidth)
1 or more
cameras
FIREBREAK = a Data Diode (uni-directional) wiring scheme barrier
Application Processor
(Linux or Android, etc.)
© 2021 NeuroBinder, Inc.
Key Concept: Firebreak = 1-way Data Diode
9
Vision Processor
(e.g. a CNN accelerator
or a chip like Movidius)
Output from Vision Processor = low-bandwidth serial bus (e.g.
SPI) carrying metadata only.
E.g.: JSON list of detected objects’ names & bounding boxes.
MIPI bus (high
bandwidth)
1 or more
cameras
FIREBREAK = a Data Diode (uni-directional) wiring scheme barrier
Application Processor
(Linux or Android, etc.)
“Cold” side of the Firebreak is only allowed to have OUTPUT-only ports.
“Hot” side of the Firebreak is only allowed to have INPUT-only ports.
The “hot” side is so named because it is at
much greater risk of getting hacked.
© 2021 NeuroBinder, Inc.
Key Concept: Firebreak = 1-way Data Diode
10
Vision Processor
(e.g. a CNN accelerator
or a chip like Movidius)
• The system is wired so as to establish a
Firebreak — a dividing line that you build into
your system between two strictly separated sides
called the “cold” side and the “hot” side.
• The Firebreak seeks to prevent a hacker who has
taken complete control of all firmware on the
“hot” side from being able to find a way into the
“cold” side.
• This is one application of a common concept
called a Data Diode (see Resources slide).
• Every connection across the Firebreak must be
wired uni-directionally:
1 output-only electrical pin on the “cold” side
+ 1 input-only electrical pin on the “hot” side”
Output from Vision Processor = low-bandwidth serial bus (e.g.
SPI) carrying metadata only.
E.g.: JSON list of detected objects’ names & bounding boxes.
Application Processor
(Linux or Android, etc.)
MIPI bus (high
bandwidth)
FIREBREAK = a Data Diode (uni-directional) wiring scheme barrier
“Cold” side of the Firebreak is only allowed to have OUTPUT-only ports.
“Hot” side of the Firebreak is only allowed to have INPUT-only ports.
The “hot” side is so named because it is at
much greater risk of getting hacked.
1 or more
cameras
© 2021 NeuroBinder, Inc.
Key Concept: Firebreak = 1-way Data Diode
11
• IF THIS RULE IS NOT ENFORCED
100% STRICTLY, THE FIREBREAK CAN BE BREACHED.
• NO EXCEPTIONS!
• THIS MEANS
NO EXCEPTIONS
NOT FOR JTAG, I2C, PCIe, NOTHING.
• Every connection across the Firebreak must be
wired uni-directionally:
1 output-only electrical pin on the “cold” side
+ 1 input-only electrical pin on the “hot” side”
© 2021 NeuroBinder, Inc.
Challenges and their Mitigations
12
• The cold section’s fw should be updatable only by direct physical access by the user taking a rare,
intentional action, such as plugging a cable + pressing a button.
• E.g., suppose that the product uses USB for charging. One option would be to connect the USB data lines to the
cold section and to configure the cold section’s chips to accept a fw update via USB only if the product’s reset
button is pressed while USB is connected.
• Requiring the cold section fw update process to be initiated via a button press mitigates the possibility that
an attacker could surreptitiously install firmware when the device is charging, by hacking the USB host PC.
• Firmware for the hot section can be installed using over-the-air updates over Wi-Fi / BT / etc.
• Both the cold and hot sections should use code signing with strong encryption.
A:
Q: If the “cold” section is output-only, how can its firmware be updated?
© 2021 NeuroBinder, Inc.
Challenges and their Mitigations
13
• Some applications certainly do fundamentally require outputting video, but I invite you to consider that many
applications do not really require outputting video if you think creatively.
• For example, a system designed to count the number of shoppers in a store should count the people using
on-device processing, and only transmit the real-time number of people in the frame; this system would
not have any good reason for transmitting video!
• In some applications, the ability to view live video is only relevant for the development stage or for debugging
issues in the field. The best way to handle these cases is to make it so that debugging can be performed by
plugging a cable (e.g. USB or Ethernet) into a debug port built into the “cold” side of the system. This cold-side
debug port would only be used for debugging, and would not be used by a customer. This port does not violate
the Firebreak because it (1) does not connect cold to hot and (2) does not connect cold to the Internet or a
radio.
• Many applications do not need to transmit live video, but could make do with simply transmitting live metadata +
recording archival video to disk, with that disk drive being a part of the cold side. This disk storage would later
be accessed by a USB port built into the cold side if the video is ever needed (e.g. for investigating a burglary).
A:
Q: Don’t some applications fundamentally require outputting video? Is there a way to make those more secure?
© 2021 NeuroBinder, Inc.
Challenges and their Mitigations
14
• There are other, lower-cost ways to implement the Firebreak concept other than the one presented in the
previous slides. Here are two lower-cost possibilities which might work for your use case:
• Option 1: If the computer vision workload of your device is low, and if your device’s camera requirements (FoV,
low light sensitivity, etc.) are suitable, you might be able to use a camera module such as the Qualcomm Glance,
which has a small embedded vision chip built right into the camera. The Qualcomm Glance still needs a host to
initialize the module at boot, but this host could be any low-cost (~$0.20) microcontroller. Then you can
establish a Firebreak between that microcontroller and the main Application Processor.
• Option 2: If your device only needs to send data to the Internet but never needs to receive anything, you can
put the Firebreak in between the Application Processor and the radio. This “transmit only” condition applies to
certain types of IoT sensor devices. For this approach, you need a radio/modem module which is capable of
operating in a standalone manner running all of its own required firmware (e.g. the Espressif ESP32), and you
can establish a Firebreak in between the Application Processor and the radio module.
A:
Q: What about cost? Won’t including a dedicated vision chip be more expensive?
© 2021 NeuroBinder, Inc.
• Every connection across the Firebreak must be wired uni-directionally:
1 output-only electrical pin on the “cold” side
+ 1 input-only electrical pin on the “hot” side”
Conclusions
15
• We need a new way of thinking about security for embedded vision devices.
• Attackers are much more capable than we’ve assumed.
• If something can be hacked, it will be hacked.
• The responsible solution is to design our hardware so that the hardware itself
cannot be hacked, by wiring in certain security guarantees at the schematic level.
• The Firebreak concept is one application of the Data Diode technique (see Resources slide).
• To implement a Firebreak, you need to split your system into a “cold” (most secure) section
and a “hot” (application code) section, with strict separation between the two sections.
© 2021 NeuroBinder, Inc.
Resources
16
Further Reading
Wikipedia: Unidirectional Network
https://en.wikipedia.org/wiki/Unidirectional_network
Fiber System: Data Diodes for Isolated and Classified Networks
https://www.fibersystem.com/data-diodes/
Owl Cyber Defense: Learn About Data Diodes
https://owlcyberdefense.com/learn-about-data-diodes/
Forcepoint: Segment and Defend Networks with Automated Uni-Directional Transfer
https://www.forcepoint.com/sites/default/files/resources/datasheets/datasheet_data_diode_en.pdf
Email for Questions:
jon@neurobinder.com

More Related Content

What's hot

"Deep Learning for Manufacturing Inspection Applications," a Presentation fro...
"Deep Learning for Manufacturing Inspection Applications," a Presentation fro..."Deep Learning for Manufacturing Inspection Applications," a Presentation fro...
"Deep Learning for Manufacturing Inspection Applications," a Presentation fro...Edge AI and Vision Alliance
 
“Alternative Image Sensors for Intelligent In-Cabin Monitoring, Home Security...
“Alternative Image Sensors for Intelligent In-Cabin Monitoring, Home Security...“Alternative Image Sensors for Intelligent In-Cabin Monitoring, Home Security...
“Alternative Image Sensors for Intelligent In-Cabin Monitoring, Home Security...Edge AI and Vision Alliance
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...Edge AI and Vision Alliance
 
"The Coming Shift from Image Sensors to Image Sensing," a Presentation from LG
"The Coming Shift from Image Sensors to Image Sensing," a Presentation from LG"The Coming Shift from Image Sensors to Image Sensing," a Presentation from LG
"The Coming Shift from Image Sensors to Image Sensing," a Presentation from LGEdge AI and Vision Alliance
 
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIAEdge AI and Vision Alliance
 
“DepthAI: Embedded, Performant Spatial AI and Computer Vision,” a Presentatio...
“DepthAI: Embedded, Performant Spatial AI and Computer Vision,” a Presentatio...“DepthAI: Embedded, Performant Spatial AI and Computer Vision,” a Presentatio...
“DepthAI: Embedded, Performant Spatial AI and Computer Vision,” a Presentatio...Edge AI and Vision Alliance
 
“A Mask Detection Smart Camera Using the Nvidia Jetson Nano: System Architect...
“A Mask Detection Smart Camera Using the Nvidia Jetson Nano: System Architect...“A Mask Detection Smart Camera Using the Nvidia Jetson Nano: System Architect...
“A Mask Detection Smart Camera Using the Nvidia Jetson Nano: System Architect...Edge AI and Vision Alliance
 
"The Path from ADAS to Autonomy," a Presentation from Strategy Analytics
"The Path from ADAS to Autonomy," a Presentation from Strategy Analytics"The Path from ADAS to Autonomy," a Presentation from Strategy Analytics
"The Path from ADAS to Autonomy," a Presentation from Strategy AnalyticsEdge AI and Vision Alliance
 
“SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-se...
“SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-se...“SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-se...
“SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-se...Edge AI and Vision Alliance
 
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...Edge AI and Vision Alliance
 
"Object Detection for Embedded Markets," a Presentation from Imagination Tech...
"Object Detection for Embedded Markets," a Presentation from Imagination Tech..."Object Detection for Embedded Markets," a Presentation from Imagination Tech...
"Object Detection for Embedded Markets," a Presentation from Imagination Tech...Edge AI and Vision Alliance
 
"Image Sensor Formats and Interfaces for IoT Applications," a Presentation fr...
"Image Sensor Formats and Interfaces for IoT Applications," a Presentation fr..."Image Sensor Formats and Interfaces for IoT Applications," a Presentation fr...
"Image Sensor Formats and Interfaces for IoT Applications," a Presentation fr...Edge AI and Vision Alliance
 
"Highly Efficient, Scalable Vision and AI Processors IP for the Edge," a Pres...
"Highly Efficient, Scalable Vision and AI Processors IP for the Edge," a Pres..."Highly Efficient, Scalable Vision and AI Processors IP for the Edge," a Pres...
"Highly Efficient, Scalable Vision and AI Processors IP for the Edge," a Pres...Edge AI and Vision Alliance
 
"Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde...
"Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde..."Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde...
"Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde...Edge AI and Vision Alliance
 
“Video Activity Recognition with Limited Data for Smart Home Applications,” a...
“Video Activity Recognition with Limited Data for Smart Home Applications,” a...“Video Activity Recognition with Limited Data for Smart Home Applications,” a...
“Video Activity Recognition with Limited Data for Smart Home Applications,” a...Edge AI and Vision Alliance
 
“A Practical Guide to Implementing ML on Embedded Devices,” a Presentation fr...
“A Practical Guide to Implementing ML on Embedded Devices,” a Presentation fr...“A Practical Guide to Implementing ML on Embedded Devices,” a Presentation fr...
“A Practical Guide to Implementing ML on Embedded Devices,” a Presentation fr...Edge AI and Vision Alliance
 
"Emerging Processor Architectures for Deep Learning: Options and Trade-offs,"...
"Emerging Processor Architectures for Deep Learning: Options and Trade-offs,"..."Emerging Processor Architectures for Deep Learning: Options and Trade-offs,"...
"Emerging Processor Architectures for Deep Learning: Options and Trade-offs,"...Edge AI and Vision Alliance
 
"Is Vision the New Wireless?," a Presentation from Qualcomm
"Is Vision the New Wireless?," a Presentation from Qualcomm"Is Vision the New Wireless?," a Presentation from Qualcomm
"Is Vision the New Wireless?," a Presentation from QualcommEdge AI and Vision Alliance
 

What's hot (20)

"Deep Learning for Manufacturing Inspection Applications," a Presentation fro...
"Deep Learning for Manufacturing Inspection Applications," a Presentation fro..."Deep Learning for Manufacturing Inspection Applications," a Presentation fro...
"Deep Learning for Manufacturing Inspection Applications," a Presentation fro...
 
“Alternative Image Sensors for Intelligent In-Cabin Monitoring, Home Security...
“Alternative Image Sensors for Intelligent In-Cabin Monitoring, Home Security...“Alternative Image Sensors for Intelligent In-Cabin Monitoring, Home Security...
“Alternative Image Sensors for Intelligent In-Cabin Monitoring, Home Security...
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
 
"The Coming Shift from Image Sensors to Image Sensing," a Presentation from LG
"The Coming Shift from Image Sensors to Image Sensing," a Presentation from LG"The Coming Shift from Image Sensors to Image Sensing," a Presentation from LG
"The Coming Shift from Image Sensors to Image Sensing," a Presentation from LG
 
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
 
“DepthAI: Embedded, Performant Spatial AI and Computer Vision,” a Presentatio...
“DepthAI: Embedded, Performant Spatial AI and Computer Vision,” a Presentatio...“DepthAI: Embedded, Performant Spatial AI and Computer Vision,” a Presentatio...
“DepthAI: Embedded, Performant Spatial AI and Computer Vision,” a Presentatio...
 
“A Mask Detection Smart Camera Using the Nvidia Jetson Nano: System Architect...
“A Mask Detection Smart Camera Using the Nvidia Jetson Nano: System Architect...“A Mask Detection Smart Camera Using the Nvidia Jetson Nano: System Architect...
“A Mask Detection Smart Camera Using the Nvidia Jetson Nano: System Architect...
 
"The Path from ADAS to Autonomy," a Presentation from Strategy Analytics
"The Path from ADAS to Autonomy," a Presentation from Strategy Analytics"The Path from ADAS to Autonomy," a Presentation from Strategy Analytics
"The Path from ADAS to Autonomy," a Presentation from Strategy Analytics
 
“SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-se...
“SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-se...“SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-se...
“SensPro2 Highly Scalable Sensor Hub DSP for Computer Vision, AI and Multi-se...
 
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...
 
"Object Detection for Embedded Markets," a Presentation from Imagination Tech...
"Object Detection for Embedded Markets," a Presentation from Imagination Tech..."Object Detection for Embedded Markets," a Presentation from Imagination Tech...
"Object Detection for Embedded Markets," a Presentation from Imagination Tech...
 
"Image Sensor Formats and Interfaces for IoT Applications," a Presentation fr...
"Image Sensor Formats and Interfaces for IoT Applications," a Presentation fr..."Image Sensor Formats and Interfaces for IoT Applications," a Presentation fr...
"Image Sensor Formats and Interfaces for IoT Applications," a Presentation fr...
 
AI on the Edge
AI on the EdgeAI on the Edge
AI on the Edge
 
"Highly Efficient, Scalable Vision and AI Processors IP for the Edge," a Pres...
"Highly Efficient, Scalable Vision and AI Processors IP for the Edge," a Pres..."Highly Efficient, Scalable Vision and AI Processors IP for the Edge," a Pres...
"Highly Efficient, Scalable Vision and AI Processors IP for the Edge," a Pres...
 
"Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde...
"Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde..."Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde...
"Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde...
 
“Video Activity Recognition with Limited Data for Smart Home Applications,” a...
“Video Activity Recognition with Limited Data for Smart Home Applications,” a...“Video Activity Recognition with Limited Data for Smart Home Applications,” a...
“Video Activity Recognition with Limited Data for Smart Home Applications,” a...
 
“A Practical Guide to Implementing ML on Embedded Devices,” a Presentation fr...
“A Practical Guide to Implementing ML on Embedded Devices,” a Presentation fr...“A Practical Guide to Implementing ML on Embedded Devices,” a Presentation fr...
“A Practical Guide to Implementing ML on Embedded Devices,” a Presentation fr...
 
LEGaTO: Use cases
LEGaTO: Use casesLEGaTO: Use cases
LEGaTO: Use cases
 
"Emerging Processor Architectures for Deep Learning: Options and Trade-offs,"...
"Emerging Processor Architectures for Deep Learning: Options and Trade-offs,"..."Emerging Processor Architectures for Deep Learning: Options and Trade-offs,"...
"Emerging Processor Architectures for Deep Learning: Options and Trade-offs,"...
 
"Is Vision the New Wireless?," a Presentation from Qualcomm
"Is Vision the New Wireless?," a Presentation from Qualcomm"Is Vision the New Wireless?," a Presentation from Qualcomm
"Is Vision the New Wireless?," a Presentation from Qualcomm
 

Similar to “Secure Hardware Architecture for Embedded Vision,” a Presentation from NeuroBinder

iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)Jonathan Engelsma
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hackSlawomir Jasek
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016joebursell
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?SecuRing
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answersccna4discovery
 
Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Dorian Hernandez
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersITExamAnswers.net
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAndy Taylor
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15Mark Goldstein
 

Similar to “Secure Hardware Architecture for Embedded Vision,” a Presentation from NeuroBinder (20)

iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 7)
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
 
Report
ReportReport
Report
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?The (Io)Things you don't even need to hack. Should we worry?
The (Io)Things you don't even need to hack. Should we worry?
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
Raspbeery PI IoT
Raspbeery PI IoTRaspbeery PI IoT
Raspbeery PI IoT
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Android system security
Android system securityAndroid system security
Android system security
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answers
 
Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013
 
Juice Jacking 101
Juice Jacking 101Juice Jacking 101
Juice Jacking 101
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 3 Exam Answers
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
 
Project report
Project reportProject report
Project report
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
 
ITE7_Chp2.pptx
ITE7_Chp2.pptxITE7_Chp2.pptx
ITE7_Chp2.pptx
 
SigfoxMakersDay Total
SigfoxMakersDay TotalSigfoxMakersDay Total
SigfoxMakersDay Total
 

More from Edge AI and Vision Alliance

“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...Edge AI and Vision Alliance
 
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...Edge AI and Vision Alliance
 
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...Edge AI and Vision Alliance
 
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...Edge AI and Vision Alliance
 
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...Edge AI and Vision Alliance
 
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...Edge AI and Vision Alliance
 
“Vision-language Representations for Robotics,” a Presentation from the Unive...
“Vision-language Representations for Robotics,” a Presentation from the Unive...“Vision-language Representations for Robotics,” a Presentation from the Unive...
“Vision-language Representations for Robotics,” a Presentation from the Unive...Edge AI and Vision Alliance
 
“ADAS and AV Sensors: What’s Winning and Why?,” a Presentation from TechInsights
“ADAS and AV Sensors: What’s Winning and Why?,” a Presentation from TechInsights“ADAS and AV Sensors: What’s Winning and Why?,” a Presentation from TechInsights
“ADAS and AV Sensors: What’s Winning and Why?,” a Presentation from TechInsightsEdge AI and Vision Alliance
 
“Computer Vision in Sports: Scalable Solutions for Downmarkets,” a Presentati...
“Computer Vision in Sports: Scalable Solutions for Downmarkets,” a Presentati...“Computer Vision in Sports: Scalable Solutions for Downmarkets,” a Presentati...
“Computer Vision in Sports: Scalable Solutions for Downmarkets,” a Presentati...Edge AI and Vision Alliance
 
“Detecting Data Drift in Image Classification Neural Networks,” a Presentatio...
“Detecting Data Drift in Image Classification Neural Networks,” a Presentatio...“Detecting Data Drift in Image Classification Neural Networks,” a Presentatio...
“Detecting Data Drift in Image Classification Neural Networks,” a Presentatio...Edge AI and Vision Alliance
 
“Deep Neural Network Training: Diagnosing Problems and Implementing Solutions...
“Deep Neural Network Training: Diagnosing Problems and Implementing Solutions...“Deep Neural Network Training: Diagnosing Problems and Implementing Solutions...
“Deep Neural Network Training: Diagnosing Problems and Implementing Solutions...Edge AI and Vision Alliance
 
“AI Start-ups: The Perils of Fishing for Whales (War Stories from the Entrepr...
“AI Start-ups: The Perils of Fishing for Whales (War Stories from the Entrepr...“AI Start-ups: The Perils of Fishing for Whales (War Stories from the Entrepr...
“AI Start-ups: The Perils of Fishing for Whales (War Stories from the Entrepr...Edge AI and Vision Alliance
 
“A Computer Vision System for Autonomous Satellite Maneuvering,” a Presentati...
“A Computer Vision System for Autonomous Satellite Maneuvering,” a Presentati...“A Computer Vision System for Autonomous Satellite Maneuvering,” a Presentati...
“A Computer Vision System for Autonomous Satellite Maneuvering,” a Presentati...Edge AI and Vision Alliance
 
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...Edge AI and Vision Alliance
 
“Sensor Fusion Techniques for Accurate Perception of Objects in the Environme...
“Sensor Fusion Techniques for Accurate Perception of Objects in the Environme...“Sensor Fusion Techniques for Accurate Perception of Objects in the Environme...
“Sensor Fusion Techniques for Accurate Perception of Objects in the Environme...Edge AI and Vision Alliance
 
“Updating the Edge ML Development Process,” a Presentation from Samsara
“Updating the Edge ML Development Process,” a Presentation from Samsara“Updating the Edge ML Development Process,” a Presentation from Samsara
“Updating the Edge ML Development Process,” a Presentation from SamsaraEdge AI and Vision Alliance
 
“Combating Bias in Production Computer Vision Systems,” a Presentation from R...
“Combating Bias in Production Computer Vision Systems,” a Presentation from R...“Combating Bias in Production Computer Vision Systems,” a Presentation from R...
“Combating Bias in Production Computer Vision Systems,” a Presentation from R...Edge AI and Vision Alliance
 
“Developing an Embedded Vision AI-powered Fitness System,” a Presentation fro...
“Developing an Embedded Vision AI-powered Fitness System,” a Presentation fro...“Developing an Embedded Vision AI-powered Fitness System,” a Presentation fro...
“Developing an Embedded Vision AI-powered Fitness System,” a Presentation fro...Edge AI and Vision Alliance
 
“Navigating the Evolving Venture Capital Landscape for Edge AI Start-ups,” a ...
“Navigating the Evolving Venture Capital Landscape for Edge AI Start-ups,” a ...“Navigating the Evolving Venture Capital Landscape for Edge AI Start-ups,” a ...
“Navigating the Evolving Venture Capital Landscape for Edge AI Start-ups,” a ...Edge AI and Vision Alliance
 
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...Edge AI and Vision Alliance
 

More from Edge AI and Vision Alliance (20)

“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
 
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
 
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
 
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
 
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
 
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
 
“Vision-language Representations for Robotics,” a Presentation from the Unive...
“Vision-language Representations for Robotics,” a Presentation from the Unive...“Vision-language Representations for Robotics,” a Presentation from the Unive...
“Vision-language Representations for Robotics,” a Presentation from the Unive...
 
“ADAS and AV Sensors: What’s Winning and Why?,” a Presentation from TechInsights
“ADAS and AV Sensors: What’s Winning and Why?,” a Presentation from TechInsights“ADAS and AV Sensors: What’s Winning and Why?,” a Presentation from TechInsights
“ADAS and AV Sensors: What’s Winning and Why?,” a Presentation from TechInsights
 
“Computer Vision in Sports: Scalable Solutions for Downmarkets,” a Presentati...
“Computer Vision in Sports: Scalable Solutions for Downmarkets,” a Presentati...“Computer Vision in Sports: Scalable Solutions for Downmarkets,” a Presentati...
“Computer Vision in Sports: Scalable Solutions for Downmarkets,” a Presentati...
 
“Detecting Data Drift in Image Classification Neural Networks,” a Presentatio...
“Detecting Data Drift in Image Classification Neural Networks,” a Presentatio...“Detecting Data Drift in Image Classification Neural Networks,” a Presentatio...
“Detecting Data Drift in Image Classification Neural Networks,” a Presentatio...
 
“Deep Neural Network Training: Diagnosing Problems and Implementing Solutions...
“Deep Neural Network Training: Diagnosing Problems and Implementing Solutions...“Deep Neural Network Training: Diagnosing Problems and Implementing Solutions...
“Deep Neural Network Training: Diagnosing Problems and Implementing Solutions...
 
“AI Start-ups: The Perils of Fishing for Whales (War Stories from the Entrepr...
“AI Start-ups: The Perils of Fishing for Whales (War Stories from the Entrepr...“AI Start-ups: The Perils of Fishing for Whales (War Stories from the Entrepr...
“AI Start-ups: The Perils of Fishing for Whales (War Stories from the Entrepr...
 
“A Computer Vision System for Autonomous Satellite Maneuvering,” a Presentati...
“A Computer Vision System for Autonomous Satellite Maneuvering,” a Presentati...“A Computer Vision System for Autonomous Satellite Maneuvering,” a Presentati...
“A Computer Vision System for Autonomous Satellite Maneuvering,” a Presentati...
 
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
“Bias in Computer Vision—It’s Bigger Than Facial Recognition!,” a Presentatio...
 
“Sensor Fusion Techniques for Accurate Perception of Objects in the Environme...
“Sensor Fusion Techniques for Accurate Perception of Objects in the Environme...“Sensor Fusion Techniques for Accurate Perception of Objects in the Environme...
“Sensor Fusion Techniques for Accurate Perception of Objects in the Environme...
 
“Updating the Edge ML Development Process,” a Presentation from Samsara
“Updating the Edge ML Development Process,” a Presentation from Samsara“Updating the Edge ML Development Process,” a Presentation from Samsara
“Updating the Edge ML Development Process,” a Presentation from Samsara
 
“Combating Bias in Production Computer Vision Systems,” a Presentation from R...
“Combating Bias in Production Computer Vision Systems,” a Presentation from R...“Combating Bias in Production Computer Vision Systems,” a Presentation from R...
“Combating Bias in Production Computer Vision Systems,” a Presentation from R...
 
“Developing an Embedded Vision AI-powered Fitness System,” a Presentation fro...
“Developing an Embedded Vision AI-powered Fitness System,” a Presentation fro...“Developing an Embedded Vision AI-powered Fitness System,” a Presentation fro...
“Developing an Embedded Vision AI-powered Fitness System,” a Presentation fro...
 
“Navigating the Evolving Venture Capital Landscape for Edge AI Start-ups,” a ...
“Navigating the Evolving Venture Capital Landscape for Edge AI Start-ups,” a ...“Navigating the Evolving Venture Capital Landscape for Edge AI Start-ups,” a ...
“Navigating the Evolving Venture Capital Landscape for Edge AI Start-ups,” a ...
 
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
“Advanced Presence Sensing: What It Means for the Smart Home,” a Presentation...
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

“Secure Hardware Architecture for Embedded Vision,” a Presentation from NeuroBinder

  • 1. © 2021 NeuroBinder, Inc. Secure Hardware Architecture for Embedded Vision Jonathan Cefalu CEO, NeuroBinder, Inc.
  • 2. © 2021 NeuroBinder, Inc. We Need to Take Advanced Hackers More Seriously 2 • Hackers are much more skilled than most product engineers give them credit for. • This leads to camera-based products repeatedly getting hacked, and a growing societal distrust of cameras in general. • To protect our customers, we need to change our mindset and find an embedded vision hardware architecture that makes it electrically impossible for a hacker to get access to live video.
  • 3. © 2021 NeuroBinder, Inc. We Need to Take Advanced Hackers More Seriously 3 • Hackers are much more skilled than most product engineers give them credit for. • This leads to camera-based products repeatedly getting hacked, and a growing societal distrust of cameras in general. • To protect our customers, we need to change our mindset and find an embedded vision hardware architecture that makes it electrically impossible for a hacker to get access to live video.
  • 4. © 2021 NeuroBinder, Inc. We Need to Take Advanced Hackers More Seriously 4 • Hackers are much more skilled than most product engineers give them credit for. • This leads to camera-based products repeatedly getting hacked, and a growing societal distrust of cameras in general. • To protect our customers, we need to change our mindset and find an embedded vision hardware architecture that makes it electrically impossible for a hacker to get access to live video.
  • 5. © 2021 NeuroBinder, Inc. Key Concepts 5 Vision Processor (e.g. a CNN accelerator or a chip like Movidius) • Camera imagery flows from the camera(s) to a dedicated vision processor (e.g. a CNN accelerator or other embedded vision chip). • The vision processor converts the camera imagery into metadata such as e.g. the names of objects in the scene, and the bounding box of each object. MIPI bus (high bandwidth) 1 or more cameras
  • 6. © 2021 NeuroBinder, Inc. Key Concept: Restrict Bandwidth of Output Bus 6 Vision Processor (e.g. a CNN accelerator or a chip like Movidius) • The vision processor is wired so as to have its only output interfaces be very low bandwidth (e.g. only SPI) which are intentionally incapable of streaming camera frames. • The metadata that the vision processor generates is outputted via JSON or a similar representation over the low-bandwidth output ports. • Since no high-bandwidth output ports exist, even if the vision processor were hacked, it cannot leak live video to the outside world. MIPI bus (high bandwidth) 1 or more cameras Output from Vision Processor = low-bandwidth serial bus (e.g. SPI) carrying metadata only. E.g.: JSON list of detected objects’ names & bounding boxes.
  • 7. © 2021 NeuroBinder, Inc. Key Concept: Firebreak = 1-way Data Diode 7 Vision Processor (e.g. a CNN accelerator or a chip like Movidius) Output from Vision Processor = low-bandwidth serial bus (e.g. SPI) carrying metadata only. E.g.: JSON list of detected objects’ names & bounding boxes. MIPI bus (high bandwidth) 1 or more cameras Application Processor (Linux or Android, etc.)
  • 8. © 2021 NeuroBinder, Inc. Key Concept: Firebreak = 1-way Data Diode 8 Vision Processor (e.g. a CNN accelerator or a chip like Movidius) Output from Vision Processor = low-bandwidth serial bus (e.g. SPI) carrying metadata only. E.g.: JSON list of detected objects’ names & bounding boxes. MIPI bus (high bandwidth) 1 or more cameras FIREBREAK = a Data Diode (uni-directional) wiring scheme barrier Application Processor (Linux or Android, etc.)
  • 9. © 2021 NeuroBinder, Inc. Key Concept: Firebreak = 1-way Data Diode 9 Vision Processor (e.g. a CNN accelerator or a chip like Movidius) Output from Vision Processor = low-bandwidth serial bus (e.g. SPI) carrying metadata only. E.g.: JSON list of detected objects’ names & bounding boxes. MIPI bus (high bandwidth) 1 or more cameras FIREBREAK = a Data Diode (uni-directional) wiring scheme barrier Application Processor (Linux or Android, etc.) “Cold” side of the Firebreak is only allowed to have OUTPUT-only ports. “Hot” side of the Firebreak is only allowed to have INPUT-only ports. The “hot” side is so named because it is at much greater risk of getting hacked.
  • 10. © 2021 NeuroBinder, Inc. Key Concept: Firebreak = 1-way Data Diode 10 Vision Processor (e.g. a CNN accelerator or a chip like Movidius) • The system is wired so as to establish a Firebreak — a dividing line that you build into your system between two strictly separated sides called the “cold” side and the “hot” side. • The Firebreak seeks to prevent a hacker who has taken complete control of all firmware on the “hot” side from being able to find a way into the “cold” side. • This is one application of a common concept called a Data Diode (see Resources slide). • Every connection across the Firebreak must be wired uni-directionally: 1 output-only electrical pin on the “cold” side + 1 input-only electrical pin on the “hot” side” Output from Vision Processor = low-bandwidth serial bus (e.g. SPI) carrying metadata only. E.g.: JSON list of detected objects’ names & bounding boxes. Application Processor (Linux or Android, etc.) MIPI bus (high bandwidth) FIREBREAK = a Data Diode (uni-directional) wiring scheme barrier “Cold” side of the Firebreak is only allowed to have OUTPUT-only ports. “Hot” side of the Firebreak is only allowed to have INPUT-only ports. The “hot” side is so named because it is at much greater risk of getting hacked. 1 or more cameras
  • 11. © 2021 NeuroBinder, Inc. Key Concept: Firebreak = 1-way Data Diode 11 • IF THIS RULE IS NOT ENFORCED 100% STRICTLY, THE FIREBREAK CAN BE BREACHED. • NO EXCEPTIONS! • THIS MEANS NO EXCEPTIONS NOT FOR JTAG, I2C, PCIe, NOTHING. • Every connection across the Firebreak must be wired uni-directionally: 1 output-only electrical pin on the “cold” side + 1 input-only electrical pin on the “hot” side”
  • 12. © 2021 NeuroBinder, Inc. Challenges and their Mitigations 12 • The cold section’s fw should be updatable only by direct physical access by the user taking a rare, intentional action, such as plugging a cable + pressing a button. • E.g., suppose that the product uses USB for charging. One option would be to connect the USB data lines to the cold section and to configure the cold section’s chips to accept a fw update via USB only if the product’s reset button is pressed while USB is connected. • Requiring the cold section fw update process to be initiated via a button press mitigates the possibility that an attacker could surreptitiously install firmware when the device is charging, by hacking the USB host PC. • Firmware for the hot section can be installed using over-the-air updates over Wi-Fi / BT / etc. • Both the cold and hot sections should use code signing with strong encryption. A: Q: If the “cold” section is output-only, how can its firmware be updated?
  • 13. © 2021 NeuroBinder, Inc. Challenges and their Mitigations 13 • Some applications certainly do fundamentally require outputting video, but I invite you to consider that many applications do not really require outputting video if you think creatively. • For example, a system designed to count the number of shoppers in a store should count the people using on-device processing, and only transmit the real-time number of people in the frame; this system would not have any good reason for transmitting video! • In some applications, the ability to view live video is only relevant for the development stage or for debugging issues in the field. The best way to handle these cases is to make it so that debugging can be performed by plugging a cable (e.g. USB or Ethernet) into a debug port built into the “cold” side of the system. This cold-side debug port would only be used for debugging, and would not be used by a customer. This port does not violate the Firebreak because it (1) does not connect cold to hot and (2) does not connect cold to the Internet or a radio. • Many applications do not need to transmit live video, but could make do with simply transmitting live metadata + recording archival video to disk, with that disk drive being a part of the cold side. This disk storage would later be accessed by a USB port built into the cold side if the video is ever needed (e.g. for investigating a burglary). A: Q: Don’t some applications fundamentally require outputting video? Is there a way to make those more secure?
  • 14. © 2021 NeuroBinder, Inc. Challenges and their Mitigations 14 • There are other, lower-cost ways to implement the Firebreak concept other than the one presented in the previous slides. Here are two lower-cost possibilities which might work for your use case: • Option 1: If the computer vision workload of your device is low, and if your device’s camera requirements (FoV, low light sensitivity, etc.) are suitable, you might be able to use a camera module such as the Qualcomm Glance, which has a small embedded vision chip built right into the camera. The Qualcomm Glance still needs a host to initialize the module at boot, but this host could be any low-cost (~$0.20) microcontroller. Then you can establish a Firebreak between that microcontroller and the main Application Processor. • Option 2: If your device only needs to send data to the Internet but never needs to receive anything, you can put the Firebreak in between the Application Processor and the radio. This “transmit only” condition applies to certain types of IoT sensor devices. For this approach, you need a radio/modem module which is capable of operating in a standalone manner running all of its own required firmware (e.g. the Espressif ESP32), and you can establish a Firebreak in between the Application Processor and the radio module. A: Q: What about cost? Won’t including a dedicated vision chip be more expensive?
  • 15. © 2021 NeuroBinder, Inc. • Every connection across the Firebreak must be wired uni-directionally: 1 output-only electrical pin on the “cold” side + 1 input-only electrical pin on the “hot” side” Conclusions 15 • We need a new way of thinking about security for embedded vision devices. • Attackers are much more capable than we’ve assumed. • If something can be hacked, it will be hacked. • The responsible solution is to design our hardware so that the hardware itself cannot be hacked, by wiring in certain security guarantees at the schematic level. • The Firebreak concept is one application of the Data Diode technique (see Resources slide). • To implement a Firebreak, you need to split your system into a “cold” (most secure) section and a “hot” (application code) section, with strict separation between the two sections.
  • 16. © 2021 NeuroBinder, Inc. Resources 16 Further Reading Wikipedia: Unidirectional Network https://en.wikipedia.org/wiki/Unidirectional_network Fiber System: Data Diodes for Isolated and Classified Networks https://www.fibersystem.com/data-diodes/ Owl Cyber Defense: Learn About Data Diodes https://owlcyberdefense.com/learn-about-data-diodes/ Forcepoint: Segment and Defend Networks with Automated Uni-Directional Transfer https://www.forcepoint.com/sites/default/files/resources/datasheets/datasheet_data_diode_en.pdf Email for Questions: jon@neurobinder.com