SlideShare a Scribd company logo
26.05.2012




                 Mit Sicherheit innovativ!

                           Claudia Eckert
                           TU München,
                           Fraunhofer Institut AISEC
                              1



                           40 Jahre Informatik Hamburg
                           18.11. 2011 Universität Hamburg




Outline


1. Motivation:  Informatik formt Zukunft 
2. Future Internet  
     Informatik als Innovationsmotor 
3. Security Threats
     Innovationen benötigen Sicherheit
4.   Research Topics           2

     Sicherheit benötigt Forschung
     Si h h it b öti t F       h
5. Selected Examples @AISEC/TUM
     Mit Sicherheit innovativ!
6.   Summary
Claudia Eckert                                               2




                                                                         1
26.05.2012




 1. Motivation


Mainframes, Embedded, Smart Environments & CPS
                                             5) Smart
                                  Environments & CPS


                                        4) RFID-Tags        Smart Grid           Factory of
                                           Embedded                              the Future


                                                                    90% of all
         1) Mainframes                                              CPUs are
                                                                    embedded


                                               1User                8.5% growth
         1 Computer       1 Computer           Multiple Computers   17 Billion total
         Multiple Users   1 User               M2M                  revenue


                                                                         Time


Claudia Eckert                                                                                3




1. Motivation
   Trends in ICT

  Cyber Physical Systems (CPS)
  • Integration of physical environments  and ICT systems (of systems)
  Characteristics: 
  • Lots of Autonomous devices/sensors                              e.g. Smart Grid

  • Embedded systems
  • Heterogeneous networks 
  • M2M‐communication

  Main tasks: 
  • Controlling & monitoring complex systems often in real‐time
  • Collecting data, exchange data, trigger actions, ….
Claudia Eckert                                                                                4




                                                                                                          2
26.05.2012




 1. Motivation
    Trends in ICT

Cloud Computing
New style of computing where massively scalable  IT‐enabled 
capabilities are delivered ‘as a service’ to external customers 
using Internet technologies  (Gartner 2008)




 Claudia Eckert                                                     5




  1. Motivation
     Trends in ICT

1.     Internet of Things = 
       Embedded Systems + Cyber Physical + Internet
2.    Internet of Services/Cloud Computing =
       Business Software + new Business Models + Internet
3.    Future Internet =
       Internet of Things + Internet of Services + Mobility + 
       Improved Core‐Network + Internet of Knowledge & Content

New Business Opportunities: e.g. 
• Smart Grid, Smart Mobility, Smart Health, Smart Cities, Factory of 
   the Future, Smart Logistics, …
• Challenge:  Handling of “Big Data”: 
   Data Acquisition, Analytics, Provisioning, …
 Claudia Eckert                                                     6




                                                                                3
26.05.2012




Outline


1. Motivation:  Informatik formt Zukunft 
2. Future Internet  
     Informatik als Innovationsmotor 
3. Security Threats
     Innovationen benötigen Sicherheit
4.   Research Topics           7

     Sicherheit benötigt Forschung
     Si h h it b öti t F       h
5. Selected Examples @AISEC/TUM
     Mit Sicherheit innovativ!
6.   Summary
Claudia Eckert                                                       7




 2. Future Internet
    Business Opportunities
Mobile Application: Convergence private/business
Consumerized IT! 
                                    Loyalty
                                                    Identity
                       Payment                      Management
                                   Communicate



                 Physical    Pay                          Content
                 Access                                   Download

                            Transact               Identify
                                                          y

                     DRM                            Ticketing

                                   Device
                                   Configuration




Claudia Eckert                                                       8




                                                                                 4
26.05.2012




  2. Future Internet
     Business Opportunities

Consumerized IT 
An increasing number of organizations take a strategic
approach to Consumerization by providing IT support
                                          IT support
for personal devices
Quelle: bringyourownit.com/2011/09/26/
trend‐micro‐consumerization‐report‐2011/


Increased Efficency:
Recent studies have shown that allowing employees to
use innovative, state‐of‐the‐art devices and services
of their own choosing can increase their efficiency. 
 f th i       h i          i       th i ffi i
Reduced Costs:
Reduced capital expenditures are likely as employees turn to their 
own personal devices to perform work, with the added benefit of 
lower device management and maintenance costs.
Quelle: Booz & Company, Comsumerization of IT, 2010




  2. Future Internet
     Business Opportunities

 Automotive Industry: Connected Drive, Web‐Services in Cars 
                                              Intelligent Car
                                              Routing and                     Traffic info and
                  Road Billing
                             g
                                              Navigation
                                              N i ti                          web cams



                                                                                      (Location based)
             Fleet Management                                                         web information



          GPS Street                                                                  Inter Car
          Parking                                                                     Communication



                  Parking Slots
                  Reservation                                   Contactless Gas        Mobile TV
                                                                Station



Use of Web Services will be common in the car
Importance of protection against attacks from the internet will increase

 Claudia Eckert                                                                                          10




                                                                                                                      5
26.05.2012




 2. Future Internet
    Business Opportunities

Smart Mobility:  Internet within the vehicle
• IP‐based communication: few and more complex control units
• Value‐added services Business Apps cloud‐based services
  Value‐added services, Business Apps , cloud‐based services 
 e.g. on‐board diagnostics,  entertainment,  e‐mobility




Claudia Eckert                                                                                   11




 2. Future Internet
    Business Opportunities

 Smart Energy: from e‐Energy to eMobility
                                                                                   eMobility
 ICT to manage and control  energy‐grids
• New pricing  billing models
  New pricing, billing models            Dynamic Management
                                           Power Consumption
• New services,         Solar cells        when price is low

  e.g. AAI
                                                            Private Households
            Office-facilities

                                                                                        Outage
                                          Processors:   Sensors:
                                          Controls      Detection of
                                                        Disruptions

                                          Storage
                                                                                 Isolated Grid


         Wind-Farm              Generators:                                      Power plant
                                Local energy                Industrial
                                producer
                                                            plant


                                                                                                 12




                                                                                                              6
26.05.2012




 2. Future Internet
    Business Opportunities

Its all about Data, Information & Knowledge!

Its is all about Security of Data:
• Correctly identified person, service, device?       Authenticity
• Correct  data, not manipulated?                               Integrity
• No data leakages to unauthorized parties?         Confidentiality
• Is authorized access to data possible?                    Availability 

             Security is essential



Claudia Eckert                                                              13




 2. Future Internet
    Business Opportunities

And .....

      Appropriate Security Measures  are urgently required

Because .... 

• Attack surfaces grow
• Lots of attacks that jeopardize the Security 




Claudia Eckert                                                              14




                                                                                         7
26.05.2012




Outline


1. Motivation:  Informatik formt Zukunft 
2. Future Internet  
     Informatik als Innovationsmotor 
3. Security Threats
     Innovationen benötigen Sicherheit
4.   Research Topics           15

     Sicherheit benötigt Forschung
     Si h h it b öti t F       h
5. Selected Examples @AISEC/TUM
     Mit Sicherheit innovativ!
6.   Summary
Claudia Eckert                                                            15




3. Security Threats
   Hardware Attacks

Malicious Hardware
•     Physical Access to Hardware like 
      Physical Access to Hardware like
      Sensors (e.g in cars):
      • Generate manipulated data, 
      • Delete data, 
      • Data leakages                         Manipulated Smart Meter
                                              in AISEC Lab



•     Product counterfeiting:
      • Forged hardware with low quality
      • Safety problems
      • Liability problems
                                           Forged break disc (left original)
Claudia Eckert                                                            16




                                                                                       8
26.05.2012




3. Security Threats
   Software Manipulation Attacks

Malicious Software
• Vulnerable Software (Operating System, Web‐
                         ( p       g y
  Application, Server)
   • Code Injection
   • Data access: manipulation, deletion
   • Session Hijacking
   • ID Spoofing
   • Denial of Service: 
      Safety‐critical applications
      can be influenced as well!


Claudia Eckert                                       17




 ‚alltägliche‘ Angriffe




                                                18




                                                                  9
26.05.2012




3. Security Threats
   Network based Attacks

Vulnerable Networks 
• Heterogeneous Technologies (e.g. GSM/LTE, WLAN, SCADA)
   • Injection of false messages,  
   • Message Replay , Sniffing, Spoofing
   • Drop messages
   • DDoS

Example: 
Example:
Stuxnet
Attack 2010



Claudia Eckert                                             19




Hacken kritischer Infrastrukturen




                                                                       10
26.05.2012




 3. Security Threats
    Example:Smart Grids




Claudia Eckert                                            21




 Current Look & Feel ….
          Future Internet will be a Security Nightmare

 Any Hope? What is required? 
       Security Technology:  Scalable, adaptable,  seamless
       Built‐in Security:          New Architectures 
                                   Secure by Design
       Health‐Monitoring:     New Services, Security as Service
                                   Secure during operation
       Security Culture:           Education, Training, Awareness
Claudia Eckert                                                      22




                                                                                11
26.05.2012




Outline


1. Motivation:  Informatik formt Zukunft 
2. Future Internet  
     Informatik als Innovationsmotor 
3. Security Threats
     Innovationen benötigen Sicherheit
4.   Research Topics           23

     Sicherheit benötigt Forschung
     Si h h it b öti t F       h
5. Selected Examples @AISEC/TUM
     Mit Sicherheit innovativ!
6.   Summary
Claudia Eckert                                                   23




4. Research Topics
   Security Technology

e.g. Scalable Hardware‐Security
   • Attack‐resistant Hardware modules
   • Reconfigurable hardware cores 
   • Secure Object Ids for  M2M authentication
   • Lightweight cryptography to support resource‐poor sensors




Claudia Eckert                                                   24




                                                                             12
26.05.2012




  4. Research Topics
     Secure by Design

   e.g. Trustworthy Software‐Architectures: 
   • Secure Programming: 
       • Input Filtering etc.

   •    Isolated execution environments
         • Controlled isolation of applications
         • Trusted Input/Output , trusted path

   •    Security & integrity checks
        Security & integrity checks
         • Security check‐points , metrics
         • Detection  of invalid system states 
         • Rollback

   Claudia Eckert                                                                                               25




  4. Research Topics
     Secure by Design

       Example: next Generation Mobile Phones



Mobile Payment      Mobile Banking   Mobile Ticketing   Mobile Visa             Mobile Health   Mobile Public
                                                                                Services        Services



                                                                 Trusted
                                                                 Applications

                                                                 Trusted
                                                                 Execution
                                                                 Environment




                                                                                                                            13
26.05.2012




 4. Research Topics
    Secure during Operation

e.g. Security as a Service 
• Identity Management
     e.g. with nPA
          mobile nPA (not yet)

•    Health monitoring &
     Malware detection
     e.g. Improve detection and 
     e g Improve detection and
         reaction methods
         Learn from observed 
         attacker behavior 

 Claudia Eckert                                 27




 Outline


    1. Motivation:  Informatik formt Zukunft 
    2. Future Internet  
         Informatik als Innovationsmotor 
    3. Security Threats
         Innovationen benötigen Sicherheit
    4.   Research Topics           28

         Sicherheit benötigt Forschung
         Si h h it b öti t F       h
    5. Selected Examples @AISEC/TUM
         Mit Sicherheit innovativ!
    6.   Summary
 Claudia Eckert                                 28




                                                            14
26.05.2012




5. Selected Examples @ AISEC/TUM
   Lightweight Cryptography
Secure Remote Key-less Entry, RKE

Problem:
 Many vehicle access systems possess
    intrinsic security weaknesses
 Symmetric cryptography for
    authentication often used
 Easy to crack!

Solution:
 Lightweight implementation of ECC
    and PKI: strong cryptography
 Secure access protocols

Claudia Eckert                                                     29




5. Selected Examples @ AISEC/TUM
   New Concepts for Component Identification

‘Finger prints’ for Objects: Unclonable Material-Based Security
Problem
• Secrets can be extracted :
     spoofed component ID, insecure keys

Solution
• Physical unclonable function (PUF)
• Object fingerprints, depend on variations
    of the of manufacturing process
• M2M Authentication:
    Physical structure generates
    Challenge-Response-Pairs in an unpredictable way
• Secure generation of cryptographic keys for standard protocols
• No protected memory necessary
Claudia Eckert




                                                                               15
26.05.2012




 5. Selected Examples @ AISEC/TUM
    Scalable Hardware Security Modules

 Automotive Environment
Problem
• Fl h Storage is insecure: not appropriate
    Flash St     i i            t      i t
    for keys and sensitive data
• Secure Storage within each ECU is very
    expensive
Solution
   Central key manaegment using a
    dedicated Secure Hardware Element

Benefit
• Secure M2M authentication of components
• Manipulation-resistant storage and cryptographic services
• Basis for secure In-Car and Car2X communication
 Claudia Eckert                                                     31




 5. Selected Examples @ AISEC/TUM
    Secure by Design

Smart Meter/Gateway
Problem:
• data leakages, privacy issues
       leakages

Solution
• Secure Smart Meter
  Compliant to BSI Protection Profile
• Based on Hardware Security Module                 Display
• Secure Handling of metering data:
  authentication, Access control,                             HSM
  data confidentiality (encryption)
• Privacy by design:
                                        HSM
  data aggregation, filtering


 Claudia Eckert                                                     32




                                                                                16
26.05.2012




5. Selected Examples @ AISEC/TUM
   Secure by Design

Product Piracy Protection
Problem
 C Copy, Re-Engineering Hi h T h Componentes
          R E i      i   High-Tech C      t

Solution
 Secure Element used as trust anchor for firmware
 Authentication between firmware und hardware
 Software Obfuscation for firmware
 Tight coupeling of firmware & hardware




Claudia Eckert                                                                                                  33




 5. Selected Examples @ AISEC/TUM
    Secure during Operation

Monitoring of Cloud-Services                                                    Workflow
                                                                                Manager
                                                                                                      GRC
                                                                                                     Manager

Problem                                                                           Policy             Metrics
                                                                                  a age
                                                                                 Manager              a age
                                                                                                     Manager
 Cloud-user lose control over their data: where is
    the data (leakages?), who has access,                                          …                         PLUGINS


Solution                                Application
                                                                                     Modelle          Vorlagen

 KPIs to measure security
                                                                    Event Bus




                                     Application Server
                                                                                           DSL Interpreter

     status of outsourced Appl.       App Controller
                                                                                   Complex Event Processing
 Dynamic controls to detect             Java VM                                            MONITORING FRAMEWORK
    misbehaviour, deviations
                                     Virtuelle Maschine                         Virtuelle Maschine
 Monitoring: e.g.
                                                          Xen / KVM Hypervisor
    Data flows (where is my data),
    Log-files (who had access),                             Betriebssystem


    Events (IDS, …)
  Claudia Eckert                                                                                                 34




                                                                                                                              17
26.05.2012




5. Selected Examples @ AISEC/TUM
   Secure during Operation

New Approaches for Malware Analytics: Topic Models


   Latent topics in
    system Call traces

E.g. Expert view:
 Tr1: graphics program
 Tr2: read and transmit
        file content
 Tr 3: receive and display
        a picture
 Expert reveals latent structures: clustering/classifying using
   semantic expert know-how
Claudia Eckert                                                          35




5. Secure during Operation
   Some AISEC/TUM Examples

Improved Malware analytics: SST Supervised Topic Transition
 Using Machine Learning Techniques and Topic Modeling for clustering
 Improved ‘semantic’ Clustering and Classification of malware




Claudia Eckert                                                          36




                                                                                    18
26.05.2012




5. Secure during Operation
   Some AISEC/TUM Examples

SST Supervised Topic Transition
 >70 topics: High accuracy, low false alarm rate, low missing rate!




                                                                       37




Putting it all together:
Example: Secure Smart Grids




                                                                                   19
26.05.2012




Summary & Take Home Message


ICT driver of Innovations: 
• Huge amounts of data are collected, processed, distributed
Innovation needs Security: 
• Data security, integrity, confidentiality is a MUST have
Security needs Research:
• Security Technologies: Scalable, adaptable
• Built‐in Security & Health Monitoring: Architectures, Services
Security needs Multidisciplinarity
• Informatics, Engineering, Math: Architecture, SE, HMI, Networks  
• Business Administration, Law, Ethics,...
Security needs Education: Security Culture
Claudia Eckert                                                     39




40 Jahre Informatik an der
Universität Hamburg



Herzlichen Glückwunsch!

•    Informatik formt die Zukunft
•    Informatik ist Innovationsmotor
•    Informatik an der Universität Hamburg
    Technologie & Gesellschaft
    Mit Sicherheit innovativ!
Alles Gute für die nächsten 40 Jahre!
Claudia Eckert                                                     40




                                                                               20
26.05.2012




Thank you for your Attention




                        Claudia Eckert
                        Fraunhofer AISEC
                        TU München, Chair for IT Security


                        E-Mail:      claudia.eckert@aisec.fraunhofer.de
                        Internet:    http://www.aisec.fraunhofer.de




Claudia Eckert                                                            41




                                                                                      21

More Related Content

What's hot

Internet of Things (Iot)
Internet of Things (Iot)Internet of Things (Iot)
Internet of Things (Iot)
Nasir Mahmood
 
Io t features_and_architecture_2009
Io t features_and_architecture_2009Io t features_and_architecture_2009
Io t features_and_architecture_2009
CATTID "Sapienza"
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
ijcsit
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
IAEME Publication
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
Lillie Coney
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
IRJET Journal
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of Things
IRJET Journal
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
Karel Van Isacker
 
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET Journal
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
ijtsrd
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
Abaram Network Solutions
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
E-Government Center Moldova
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Desiree Miloshevic
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoT
ijtsrd
 
Future network architecture: requirements and challenges
Future network architecture: requirements and challengesFuture network architecture: requirements and challenges
Future network architecture: requirements and challenges
Antonio Marcos Alberti
 
20171213 Future Internet: The forgotten Enabler for SmartCities
20171213 Future Internet: The forgotten Enabler for SmartCities20171213 Future Internet: The forgotten Enabler for SmartCities
20171213 Future Internet: The forgotten Enabler for SmartCities
stefano de panfilis
 

What's hot (18)

Internet of Things (Iot)
Internet of Things (Iot)Internet of Things (Iot)
Internet of Things (Iot)
 
Io t features_and_architecture_2009
Io t features_and_architecture_2009Io t features_and_architecture_2009
Io t features_and_architecture_2009
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of ThingsFundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of Things
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoT
 
Future network architecture: requirements and challenges
Future network architecture: requirements and challengesFuture network architecture: requirements and challenges
Future network architecture: requirements and challenges
 
20171213 Future Internet: The forgotten Enabler for SmartCities
20171213 Future Internet: The forgotten Enabler for SmartCities20171213 Future Internet: The forgotten Enabler for SmartCities
20171213 Future Internet: The forgotten Enabler for SmartCities
 

Viewers also liked

1propagation
1propagation1propagation
1propagation
Canzie
 
Design of students’ attendance system based on mobile indoor location
Design of students’ attendance system based on mobile indoor locationDesign of students’ attendance system based on mobile indoor location
Design of students’ attendance system based on mobile indoor location
Ali Mohammad Hossein Zadeh
 
Ibwave propagation quick start guide
Ibwave propagation   quick start guideIbwave propagation   quick start guide
Ibwave propagation quick start guide
Virak Sou
 
Optimization Module Overview
Optimization Module OverviewOptimization Module Overview
Optimization Module Overview
iBwave Solutions
 
In building solutions ibs using distributed antenna system
In building solutions  ibs  using distributed antenna systemIn building solutions  ibs  using distributed antenna system
In building solutions ibs using distributed antenna system
IAEME Publication
 
IBS Training
IBS TrainingIBS Training
IBS Training
Tempus Telcosys
 
IBS Presentation
IBS PresentationIBS Presentation
IBS Presentation
Pk Doctors
 

Viewers also liked (7)

1propagation
1propagation1propagation
1propagation
 
Design of students’ attendance system based on mobile indoor location
Design of students’ attendance system based on mobile indoor locationDesign of students’ attendance system based on mobile indoor location
Design of students’ attendance system based on mobile indoor location
 
Ibwave propagation quick start guide
Ibwave propagation   quick start guideIbwave propagation   quick start guide
Ibwave propagation quick start guide
 
Optimization Module Overview
Optimization Module OverviewOptimization Module Overview
Optimization Module Overview
 
In building solutions ibs using distributed antenna system
In building solutions  ibs  using distributed antenna systemIn building solutions  ibs  using distributed antenna system
In building solutions ibs using distributed antenna system
 
IBS Training
IBS TrainingIBS Training
IBS Training
 
IBS Presentation
IBS PresentationIBS Presentation
IBS Presentation
 

Similar to 40 Jahre Informatik Hamburg

smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOT
Karthikeyan T
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
Kim Escherich
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
Vishakha Kumar
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moran
egovernment
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017
Harbor Research
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
Vandana Verma
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
Arpan Pal
 
Secure Data Transmission using IBOOS in VANET
Secure Data Transmission using IBOOS in VANET Secure Data Transmission using IBOOS in VANET
Secure Data Transmission using IBOOS in VANET
Associate Professor in VSB Coimbatore
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
Manipal University Jaipur
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
Stéphane Roule
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
Nirmal Misra
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iem
Arpan Pal
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Amazon Web Services
 
20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai
Frank Chee-Da TSAI (蔡其達)
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
Michel de Goede
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing Lane
MaRS Discovery District
 
Unstoppable Wireless Forces
Unstoppable Wireless ForcesUnstoppable Wireless Forces
Unstoppable Wireless Forces
Continuous Computing
 
Keeping Your Cloud Infrastructure Healthy with the Internet of Things
Keeping Your Cloud Infrastructure Healthy with the Internet of ThingsKeeping Your Cloud Infrastructure Healthy with the Internet of Things
Keeping Your Cloud Infrastructure Healthy with the Internet of Things
Jennifer Stern
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firms
Martina Naughton
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT Convergence
Michelle Holley
 

Similar to 40 Jahre Informatik Hamburg (20)

smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOT
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moran
 
Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017Harbor Research: IoT Investment Report - June 2017
Harbor Research: IoT Investment Report - June 2017
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Secure Data Transmission using IBOOS in VANET
Secure Data Transmission using IBOOS in VANET Secure Data Transmission using IBOOS in VANET
Secure Data Transmission using IBOOS in VANET
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iem
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
 
20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai20180115 Mobile AIoT Networking-ftsai
20180115 Mobile AIoT Networking-ftsai
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing Lane
 
Unstoppable Wireless Forces
Unstoppable Wireless ForcesUnstoppable Wireless Forces
Unstoppable Wireless Forces
 
Keeping Your Cloud Infrastructure Healthy with the Internet of Things
Keeping Your Cloud Infrastructure Healthy with the Internet of ThingsKeeping Your Cloud Infrastructure Healthy with the Internet of Things
Keeping Your Cloud Infrastructure Healthy with the Internet of Things
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firms
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT Convergence
 

More from Fraunhofer AISEC

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vorn
Fraunhofer AISEC
 
Internet of (Every)Thing
Internet of (Every)ThingInternet of (Every)Thing
Internet of (Every)Thing
Fraunhofer AISEC
 
App Ray: 10000 Apps
App Ray: 10000 AppsApp Ray: 10000 Apps
App Ray: 10000 Apps
Fraunhofer AISEC
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische Geräte
Fraunhofer AISEC
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013
Fraunhofer AISEC
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
Fraunhofer AISEC
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
Fraunhofer AISEC
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-Sicherheit
Fraunhofer AISEC
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for Security
Fraunhofer AISEC
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der IT
Fraunhofer AISEC
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
Fraunhofer AISEC
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic Products
Fraunhofer AISEC
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
Fraunhofer AISEC
 
Infografik Produktschutz
Infografik ProduktschutzInfografik Produktschutz
Infografik Produktschutz
Fraunhofer AISEC
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der Wissenschaft
Fraunhofer AISEC
 
Produktschutz Infografik
Produktschutz InfografikProduktschutz Infografik
Produktschutz Infografik
Fraunhofer AISEC
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealth
Fraunhofer AISEC
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Fraunhofer AISEC
 
Alan Turing
Alan Turing Alan Turing
Alan Turing
Fraunhofer AISEC
 
Sicherheit im Smart Grid
Sicherheit im Smart GridSicherheit im Smart Grid
Sicherheit im Smart Grid
Fraunhofer AISEC
 

More from Fraunhofer AISEC (20)

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vorn
 
Internet of (Every)Thing
Internet of (Every)ThingInternet of (Every)Thing
Internet of (Every)Thing
 
App Ray: 10000 Apps
App Ray: 10000 AppsApp Ray: 10000 Apps
App Ray: 10000 Apps
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische Geräte
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-Sicherheit
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for Security
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der IT
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic Products
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
 
Infografik Produktschutz
Infografik ProduktschutzInfografik Produktschutz
Infografik Produktschutz
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der Wissenschaft
 
Produktschutz Infografik
Produktschutz InfografikProduktschutz Infografik
Produktschutz Infografik
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealth
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht Forschung
 
Alan Turing
Alan Turing Alan Turing
Alan Turing
 
Sicherheit im Smart Grid
Sicherheit im Smart GridSicherheit im Smart Grid
Sicherheit im Smart Grid
 

Recently uploaded

Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
aakash malhotra
 
Pigging Unit Lubricant Oil Blending Plant
Pigging Unit Lubricant Oil Blending PlantPigging Unit Lubricant Oil Blending Plant
Pigging Unit Lubricant Oil Blending Plant
LINUS PROJECTS (INDIA)
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
aslasdfmkhan4750
 
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
sunilverma7884
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
Figma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdfFigma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdf
Management Institute of Skills Development
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
Jimmy Lai
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
Edge AI and Vision Alliance
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
digitalxplive
 
Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
CEPTES Software Inc
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 

Recently uploaded (20)

Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
 
Pigging Unit Lubricant Oil Blending Plant
Pigging Unit Lubricant Oil Blending PlantPigging Unit Lubricant Oil Blending Plant
Pigging Unit Lubricant Oil Blending Plant
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
 
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
Figma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdfFigma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdf
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
The Rise of AI in Cybersecurity How Machine Learning Will Shape Threat Detect...
 
Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 

40 Jahre Informatik Hamburg

  • 1. 26.05.2012 Mit Sicherheit innovativ! Claudia Eckert TU München, Fraunhofer Institut AISEC 1 40 Jahre Informatik Hamburg 18.11. 2011 Universität Hamburg Outline 1. Motivation:  Informatik formt Zukunft  2. Future Internet   Informatik als Innovationsmotor  3. Security Threats Innovationen benötigen Sicherheit 4.   Research Topics 2 Sicherheit benötigt Forschung Si h h it b öti t F h 5. Selected Examples @AISEC/TUM Mit Sicherheit innovativ! 6.   Summary Claudia Eckert 2 1
  • 2. 26.05.2012 1. Motivation Mainframes, Embedded, Smart Environments & CPS 5) Smart Environments & CPS 4) RFID-Tags Smart Grid Factory of Embedded the Future 90% of all 1) Mainframes CPUs are embedded 1User 8.5% growth 1 Computer 1 Computer Multiple Computers 17 Billion total Multiple Users 1 User M2M revenue Time Claudia Eckert 3 1. Motivation Trends in ICT Cyber Physical Systems (CPS) • Integration of physical environments  and ICT systems (of systems) Characteristics:  • Lots of Autonomous devices/sensors e.g. Smart Grid • Embedded systems • Heterogeneous networks  • M2M‐communication Main tasks:  • Controlling & monitoring complex systems often in real‐time • Collecting data, exchange data, trigger actions, …. Claudia Eckert 4 2
  • 3. 26.05.2012 1. Motivation Trends in ICT Cloud Computing New style of computing where massively scalable  IT‐enabled  capabilities are delivered ‘as a service’ to external customers  using Internet technologies  (Gartner 2008) Claudia Eckert 5 1. Motivation Trends in ICT 1.     Internet of Things =  Embedded Systems + Cyber Physical + Internet 2.    Internet of Services/Cloud Computing = Business Software + new Business Models + Internet 3.    Future Internet = Internet of Things + Internet of Services + Mobility +  Improved Core‐Network + Internet of Knowledge & Content New Business Opportunities: e.g.  • Smart Grid, Smart Mobility, Smart Health, Smart Cities, Factory of  the Future, Smart Logistics, … • Challenge:  Handling of “Big Data”:  Data Acquisition, Analytics, Provisioning, … Claudia Eckert 6 3
  • 4. 26.05.2012 Outline 1. Motivation:  Informatik formt Zukunft  2. Future Internet   Informatik als Innovationsmotor  3. Security Threats Innovationen benötigen Sicherheit 4.   Research Topics 7 Sicherheit benötigt Forschung Si h h it b öti t F h 5. Selected Examples @AISEC/TUM Mit Sicherheit innovativ! 6.   Summary Claudia Eckert 7 2. Future Internet Business Opportunities Mobile Application: Convergence private/business Consumerized IT!  Loyalty Identity Payment Management Communicate Physical Pay Content Access Download Transact Identify y DRM Ticketing Device Configuration Claudia Eckert 8 4
  • 5. 26.05.2012 2. Future Internet Business Opportunities Consumerized IT  An increasing number of organizations take a strategic approach to Consumerization by providing IT support IT support for personal devices Quelle: bringyourownit.com/2011/09/26/ trend‐micro‐consumerization‐report‐2011/ Increased Efficency: Recent studies have shown that allowing employees to use innovative, state‐of‐the‐art devices and services of their own choosing can increase their efficiency.  f th i h i i th i ffi i Reduced Costs: Reduced capital expenditures are likely as employees turn to their  own personal devices to perform work, with the added benefit of  lower device management and maintenance costs. Quelle: Booz & Company, Comsumerization of IT, 2010 2. Future Internet Business Opportunities Automotive Industry: Connected Drive, Web‐Services in Cars  Intelligent Car Routing and Traffic info and Road Billing g Navigation N i ti web cams (Location based) Fleet Management web information GPS Street Inter Car Parking Communication Parking Slots Reservation Contactless Gas Mobile TV Station Use of Web Services will be common in the car Importance of protection against attacks from the internet will increase Claudia Eckert 10 5
  • 6. 26.05.2012 2. Future Internet Business Opportunities Smart Mobility:  Internet within the vehicle • IP‐based communication: few and more complex control units • Value‐added services Business Apps cloud‐based services Value‐added services, Business Apps , cloud‐based services  e.g. on‐board diagnostics,  entertainment,  e‐mobility Claudia Eckert 11 2. Future Internet Business Opportunities Smart Energy: from e‐Energy to eMobility eMobility ICT to manage and control  energy‐grids • New pricing  billing models New pricing, billing models Dynamic Management Power Consumption • New services, Solar cells when price is low e.g. AAI Private Households Office-facilities Outage Processors: Sensors: Controls Detection of Disruptions Storage Isolated Grid Wind-Farm Generators: Power plant Local energy Industrial producer plant 12 6
  • 7. 26.05.2012 2. Future Internet Business Opportunities Its all about Data, Information & Knowledge! Its is all about Security of Data: • Correctly identified person, service, device?       Authenticity • Correct  data, not manipulated?                               Integrity • No data leakages to unauthorized parties?         Confidentiality • Is authorized access to data possible?                    Availability  Security is essential Claudia Eckert 13 2. Future Internet Business Opportunities And ..... Appropriate Security Measures  are urgently required Because ....  • Attack surfaces grow • Lots of attacks that jeopardize the Security  Claudia Eckert 14 7
  • 8. 26.05.2012 Outline 1. Motivation:  Informatik formt Zukunft  2. Future Internet   Informatik als Innovationsmotor  3. Security Threats Innovationen benötigen Sicherheit 4.   Research Topics 15 Sicherheit benötigt Forschung Si h h it b öti t F h 5. Selected Examples @AISEC/TUM Mit Sicherheit innovativ! 6.   Summary Claudia Eckert 15 3. Security Threats Hardware Attacks Malicious Hardware • Physical Access to Hardware like  Physical Access to Hardware like Sensors (e.g in cars): • Generate manipulated data,  • Delete data,  • Data leakages Manipulated Smart Meter in AISEC Lab • Product counterfeiting: • Forged hardware with low quality • Safety problems • Liability problems Forged break disc (left original) Claudia Eckert 16 8
  • 9. 26.05.2012 3. Security Threats Software Manipulation Attacks Malicious Software • Vulnerable Software (Operating System, Web‐ ( p g y Application, Server) • Code Injection • Data access: manipulation, deletion • Session Hijacking • ID Spoofing • Denial of Service:  Safety‐critical applications can be influenced as well! Claudia Eckert 17 ‚alltägliche‘ Angriffe 18 9
  • 10. 26.05.2012 3. Security Threats Network based Attacks Vulnerable Networks  • Heterogeneous Technologies (e.g. GSM/LTE, WLAN, SCADA) • Injection of false messages,   • Message Replay , Sniffing, Spoofing • Drop messages • DDoS Example:  Example: Stuxnet Attack 2010 Claudia Eckert 19 Hacken kritischer Infrastrukturen 10
  • 11. 26.05.2012 3. Security Threats Example:Smart Grids Claudia Eckert 21 Current Look & Feel …. Future Internet will be a Security Nightmare Any Hope? What is required?  Security Technology:  Scalable, adaptable,  seamless Built‐in Security:          New Architectures  Secure by Design Health‐Monitoring:     New Services, Security as Service Secure during operation Security Culture: Education, Training, Awareness Claudia Eckert 22 11
  • 12. 26.05.2012 Outline 1. Motivation:  Informatik formt Zukunft  2. Future Internet   Informatik als Innovationsmotor  3. Security Threats Innovationen benötigen Sicherheit 4.   Research Topics 23 Sicherheit benötigt Forschung Si h h it b öti t F h 5. Selected Examples @AISEC/TUM Mit Sicherheit innovativ! 6.   Summary Claudia Eckert 23 4. Research Topics Security Technology e.g. Scalable Hardware‐Security • Attack‐resistant Hardware modules • Reconfigurable hardware cores  • Secure Object Ids for  M2M authentication • Lightweight cryptography to support resource‐poor sensors Claudia Eckert 24 12
  • 13. 26.05.2012 4. Research Topics Secure by Design e.g. Trustworthy Software‐Architectures:  • Secure Programming:  • Input Filtering etc. • Isolated execution environments • Controlled isolation of applications • Trusted Input/Output , trusted path • Security & integrity checks Security & integrity checks • Security check‐points , metrics • Detection  of invalid system states  • Rollback Claudia Eckert 25 4. Research Topics Secure by Design Example: next Generation Mobile Phones Mobile Payment Mobile Banking Mobile Ticketing Mobile Visa Mobile Health Mobile Public Services Services Trusted Applications Trusted Execution Environment 13
  • 14. 26.05.2012 4. Research Topics Secure during Operation e.g. Security as a Service  • Identity Management e.g. with nPA mobile nPA (not yet) • Health monitoring & Malware detection e.g. Improve detection and  e g Improve detection and reaction methods Learn from observed  attacker behavior  Claudia Eckert 27 Outline 1. Motivation:  Informatik formt Zukunft  2. Future Internet   Informatik als Innovationsmotor  3. Security Threats Innovationen benötigen Sicherheit 4.   Research Topics 28 Sicherheit benötigt Forschung Si h h it b öti t F h 5. Selected Examples @AISEC/TUM Mit Sicherheit innovativ! 6.   Summary Claudia Eckert 28 14
  • 15. 26.05.2012 5. Selected Examples @ AISEC/TUM Lightweight Cryptography Secure Remote Key-less Entry, RKE Problem:  Many vehicle access systems possess intrinsic security weaknesses  Symmetric cryptography for authentication often used  Easy to crack! Solution:  Lightweight implementation of ECC and PKI: strong cryptography  Secure access protocols Claudia Eckert 29 5. Selected Examples @ AISEC/TUM New Concepts for Component Identification ‘Finger prints’ for Objects: Unclonable Material-Based Security Problem • Secrets can be extracted : spoofed component ID, insecure keys Solution • Physical unclonable function (PUF) • Object fingerprints, depend on variations of the of manufacturing process • M2M Authentication: Physical structure generates Challenge-Response-Pairs in an unpredictable way • Secure generation of cryptographic keys for standard protocols • No protected memory necessary Claudia Eckert 15
  • 16. 26.05.2012 5. Selected Examples @ AISEC/TUM Scalable Hardware Security Modules Automotive Environment Problem • Fl h Storage is insecure: not appropriate Flash St i i t i t for keys and sensitive data • Secure Storage within each ECU is very expensive Solution  Central key manaegment using a dedicated Secure Hardware Element Benefit • Secure M2M authentication of components • Manipulation-resistant storage and cryptographic services • Basis for secure In-Car and Car2X communication Claudia Eckert 31 5. Selected Examples @ AISEC/TUM Secure by Design Smart Meter/Gateway Problem: • data leakages, privacy issues leakages Solution • Secure Smart Meter Compliant to BSI Protection Profile • Based on Hardware Security Module Display • Secure Handling of metering data: authentication, Access control, HSM data confidentiality (encryption) • Privacy by design: HSM data aggregation, filtering Claudia Eckert 32 16
  • 17. 26.05.2012 5. Selected Examples @ AISEC/TUM Secure by Design Product Piracy Protection Problem  C Copy, Re-Engineering Hi h T h Componentes R E i i High-Tech C t Solution  Secure Element used as trust anchor for firmware  Authentication between firmware und hardware  Software Obfuscation for firmware  Tight coupeling of firmware & hardware Claudia Eckert 33 5. Selected Examples @ AISEC/TUM Secure during Operation Monitoring of Cloud-Services Workflow Manager GRC Manager Problem Policy Metrics a age Manager a age Manager  Cloud-user lose control over their data: where is the data (leakages?), who has access, … PLUGINS Solution Application Modelle Vorlagen  KPIs to measure security Event Bus Application Server DSL Interpreter status of outsourced Appl. App Controller Complex Event Processing  Dynamic controls to detect Java VM MONITORING FRAMEWORK misbehaviour, deviations Virtuelle Maschine Virtuelle Maschine  Monitoring: e.g. Xen / KVM Hypervisor Data flows (where is my data), Log-files (who had access), Betriebssystem Events (IDS, …) Claudia Eckert 34 17
  • 18. 26.05.2012 5. Selected Examples @ AISEC/TUM Secure during Operation New Approaches for Malware Analytics: Topic Models  Latent topics in system Call traces E.g. Expert view:  Tr1: graphics program  Tr2: read and transmit file content  Tr 3: receive and display a picture  Expert reveals latent structures: clustering/classifying using semantic expert know-how Claudia Eckert 35 5. Secure during Operation Some AISEC/TUM Examples Improved Malware analytics: SST Supervised Topic Transition  Using Machine Learning Techniques and Topic Modeling for clustering  Improved ‘semantic’ Clustering and Classification of malware Claudia Eckert 36 18
  • 19. 26.05.2012 5. Secure during Operation Some AISEC/TUM Examples SST Supervised Topic Transition  >70 topics: High accuracy, low false alarm rate, low missing rate! 37 Putting it all together: Example: Secure Smart Grids 19
  • 20. 26.05.2012 Summary & Take Home Message ICT driver of Innovations:  • Huge amounts of data are collected, processed, distributed Innovation needs Security:  • Data security, integrity, confidentiality is a MUST have Security needs Research: • Security Technologies: Scalable, adaptable • Built‐in Security & Health Monitoring: Architectures, Services Security needs Multidisciplinarity • Informatics, Engineering, Math: Architecture, SE, HMI, Networks   • Business Administration, Law, Ethics,... Security needs Education: Security Culture Claudia Eckert 39 40 Jahre Informatik an der Universität Hamburg Herzlichen Glückwunsch! • Informatik formt die Zukunft • Informatik ist Innovationsmotor • Informatik an der Universität Hamburg Technologie & Gesellschaft Mit Sicherheit innovativ! Alles Gute für die nächsten 40 Jahre! Claudia Eckert 40 20
  • 21. 26.05.2012 Thank you for your Attention Claudia Eckert Fraunhofer AISEC TU München, Chair for IT Security E-Mail: claudia.eckert@aisec.fraunhofer.de Internet: http://www.aisec.fraunhofer.de Claudia Eckert 41 21