SlideShare a Scribd company logo
Introduction to prpl 
Art Swift, president prpl Foundation 
Embedded Linux Conference Europe (ELCE) 2014 
10/15/2014
Mission 
‘prpl’ is an open-source, community-driven, collaborative, non-profit 
foundation targeting and supporting the MIPS architecture 
– and open to all – 
with a focus on enabling next-generation datacenter-to-device 
portable software and virtualized architectures 
Introduction October 14, 2014 to prpl – ELCE 2014 2
Our founding members 
Introduction October 14, 2014 to prpl – ELCE 2014 3
prpl core strategies 
Introduction October 14, 2014 to prpl – ELCE 2014 4
Why open-source? 
• Enabling the IoT and Big Data revolution 
needs collaborative minds 
• Fragmentation will slow down innovation 
• More eyeballs = more secure 
• Community benefits 
– Large ROI benefit – up to 4x gain 
– Time-to-Market & lower TCO 
– Stronger ecosystem 
– Faster innovation through focus on core 
competency 
Introduction October 14, 2014 to prpl – ELCE 2014 5
Our initial PEGs (prpl Engineering Groups) 
Introduction October 14, 2014 to prpl – ELCE 2014 6
What’s coming next? 
Tools and 
Tool 
Chains 
Secure 
Hypervisors 
Prpl Stamp 
Hardware Certification 
Program 
Fully tested, open 
source supported, 
development HW from 
prpl partners for 
different markets 
CI20 – a great example from Imagination! 
Introduction October 14, 2014 to prpl – ELCE 2014 7
prpl engineering work 
▪ Virtualization Ecosystem 
▪ Hypervisors (eg KVM, Fiasco.oc) 
▪ OS 
▪ Data Center – Redhat, Ubuntu, Debian, CentOS 
▪ Networking –Montavista, OpenWrt 
▪ Embedded/IoT & Mobile - Android, Chromium, 
Tizen, WebOS, RTOSs, Yocto 
▪ Kernel (device tree, power mgmt, multi-threading) 
▪ Portability 
▪ JITs (V8, openJDK, etc) 
▪ Emulation (QEMU) 
▪ Tools (SDK, IDE) 
▪ Platform 
▪ UEFI and boot loaders 
▪ Optimization 
▪ Intrinsics (eg SIMD) and libraries (eg memcpy) – 
■ Multimedia - video, audio, speech 
■ Networking 
■ Security 
■ Networking (multi-core friendly and aynchronous) 
■ e.g. BGP, OVS, snort, routing protocols, DPI 
Introduction October 14, 2014 to prpl – ELCE 2014 8
Introduction October 14, 2014 to prpl – ELCE 2014 9
Portability, Virtualization, and Compute 
Context: What is the vision for prpl and 
what is driving our decisions? 
Introduction October 14, 2014 to prpl – ELCE 2014 10
The diverse and insecure IOT world! 
Which will generate and transmit Mountains of Data! 
Introduction October 14, 2014 to prpl – ELCE 2014 11
Diversity and Big Data: The Internet of Cow 
1.5B cows 
200MB/yr/cow 
= 
300,000 GB 
(0.3 petabytes) 
per year 
Introduction October 14, 2014 to prpl – ELCE 2014 12
Diversity and Big Data: Turbines 
12,000 turbines 
500GB/day each 
= 
6 million GB 
(6 petabytes) 
per day 
Introduction October 14, 2014 to prpl – ELCE 2014 13
Little Data  Big Data  Huge Data 
• Each successive node in the IoT chain adds 
– Data and Storage requirements 
– Processing Requirements 
– Multi-tenant Requirements (i.e. security) 
Bytes 
Megabytes 
Terabytes 
Petabytes 
Exabytes 
ZETTABYTES 
(1000^7) 
Introduction October 14, 2014 to prpl – ELCE 2014 14
Key Enablers for IoT 
• Processing power 
• Networking infrastructure and connectivity 
• Low cost, secure devices 
• Storage 
• Loads and loads of secure, portable software 
• A way to make money 
Introduction October 14, 2014 to prpl – ELCE 2014 15
IoT Market Challenges 
• Scale 
– Billions of devices (identity & authentication management, in-field updates, dynamic interactions, big data, real 
time data mgmt.) 
• Multiple technologies and standards 
– Creation of technology silos 
– Established / emerging / competing 
– Standardization is a key enabler 
• Solutions are highly fragmented 
– Need for common/flexible platforms 
– Applications environments with multiple PKIs or Roots of Trust 
• Low power requirements 
– Operate for 2 years on a coin battery 
• Cost limitation 
• Long life cycles 
Security 
Introduction October 14, 2014 to prpl – ELCE 2014 16
Introduction October 14, 2014 to prpl – ELCE 2014 17
Introduction October 14, 2014 to prpl – ELCE 2014 18
More connected homes, more problems 
• “Smart refrigerators and TVs 
hacked to send out spam …” 
– NBC news 
• If hackers can exploit a 
weakness in a single type of 
Internet-connected home 
appliance or system—such as 
an Internet-connected door 
lock—they may be able to 
harm thousands of people at 
once. 
Introduction October 14, 2014 to prpl – ELCE 2014 19
Target Breach: an anatomy 
$200M cost, 
CEO ousted 
1 HVAC systems 
Compromised 
credentials from 
HVAC vendor 
monitor temp. 
changes for seeing 
how long 
customers stay 
2 
Malware 
programs 
installed on 
HVAC systems 
3 
Unified backend 
systems at store 
(and most 
retailers) 
4 
PoS system 
breached 
5 
Millions of credit 
card numbers 
start flowing out 
6 
Breach 
detected! Manual 
intervention was 
needed 
7 
Introduction October 14, 2014 to prpl – ELCE 2014 20
IoT Security Chain (device-to-datacenter) 
Sensors 
Nodes 
Aggregation Points 
Routers /Gateways 
STBs 
Cloud 
HW Root of Trust + Secure Boot => Secure Over The Air/Wired Field Updates 
Secure sensor data for 
sensitive applications (e.g. 
medical, industrial, enterprise) 
Enable in field device personalization (add/remove features) 
Future proof designs with flexible programmable architecture 
Private Data Disposal 
Secure Server + Secure 
Network => Secure 
Services 
Secure Remote Monitoring 
Protect Intellectual Property against SW cloning (e.g. proprietary algorithms) 
Intellectual Property Tampering Detection 
Intrusion Detection and Secure Remote Monitoring 
Introduction October 14, 2014 to prpl – ELCE 2014 21
Platform security – one approach 
Through hardware virtualization support and secure hypervisors 
• Secure boot process starts out in 
ROM 
• After bootloader, the root of 
trust (hypervisor) is verified and 
loaded 
• Iteratively verifies next stage of 
boot until HLOS (optionally 
inclusive) 
• Secure partition(s) able to access 
full memory map. Non-secure 
can access only its partition. 
Non-Secure 
App 
Non-Secure 
App 
Non-Secure 
App 
Non-secure HLOS (e.g. 
Android) 
Secure App 1 
Secure App 2 
Secure 
OS 1 
Secure App 3 
Secure & Protected Hypervisor 
Virtualized N-core MIPS i6400 CPU 
Virtualized I/O and Memory thru entire SoC Complex 
Secure 
OS 2 
Introduction October 14, 2014 to prpl – ELCE 2014 22
Exploring Virtualization 
Multiple Secure Domains More Reliable & Predictable 
Secure Hypervisor 
CPU 1 CPU 2 CPU 3 CPU 4 CPU 1 
Secure Monitor 
CPU 2 CPU 3 CPU 4 
Secure Hypervisor 
CPU 1 CPU 2 CPU 3 CPU 4 
CPU 2 CPU 3 CPU 4 
More Powerful & Efficient Safer! 
CPU 1 
• Global Platform considering 
certifiable containers 
Secure Monitor 
• Secure services can only affect their 
container, not the overall system 
CPU 1 
Secure Hypervisor 
CPU 2 CPU 3 CPU 4 CPU 1 
Secure Monitor 
CPU 2 CPU 3 CPU 4 
Introduction October 14, 2014 to prpl – ELCE 2014 23
Summary: what will prpl do? 
• Focus on the software “glue” necessary to carry secure 
structured and unstructured data from the device to the 
datacenter 
• Example: 
– Secure hypervisors for multiple tenants 
– Portable software, such as JITs 
– SaaS, PaaS, IaaS OTA secure 
– Programming models to enable big data processing (eg hadoop) over 
heterogeneous processors 
Embedded 
nodes 
OpenWrt 
hub 
Networking 
backbone 
Datacenter 
Introduction October 14, 2014 to prpl – ELCE 2014 24
How to Get Involved in prpl 
Mailing list 
lists.prplfoundation.org 
Wiki 
wiki.prplfoundation.org 
Forums 
forum.prplfoundation.org 
Code 
github.com/prplfoundation 
Introduction October 14, 2014 to prpl – ELCE 2014 25
Resources 
• http://prplfoundation.org 
• http://www.cisco.com/web/about/ac79/docs/in 
nov/IoE_Economy.pdf 
• http://theinstitute.ieee.org/benefits/standards/s 
etting-the-stage-for-the-internet-of-things 
• FTC Workshop on IoT and Security (Nov ‘13) 
• art (at) prplfoundation (dot) org 
Introduction October 14, 2014 to prpl – ELCE 2014 26
Thanks! 
Art Swift, president

More Related Content

What's hot

LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
Linaro
 
DPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationDPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway Application
Michelle Holley
 
BGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerBGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN Controller
APNIC
 
DPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet ProcessingDPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet Processing
Michelle Holley
 
Building Embedded Linux Full Tutorial for ARM
Building Embedded Linux Full Tutorial for ARMBuilding Embedded Linux Full Tutorial for ARM
Building Embedded Linux Full Tutorial for ARM
Sherif Mousa
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet Processing
Michelle Holley
 
BPF / XDP 8월 세미나 KossLab
BPF / XDP 8월 세미나 KossLabBPF / XDP 8월 세미나 KossLab
BPF / XDP 8월 세미나 KossLab
Taeung Song
 
Cilium - Network security for microservices
Cilium - Network security for microservicesCilium - Network security for microservices
Cilium - Network security for microservices
Thomas Graf
 
Linux device drivers
Linux device drivers Linux device drivers
DPDK KNI interface
DPDK KNI interfaceDPDK KNI interface
DPDK KNI interface
Denys Haryachyy
 
import rdma: zero-copy networking with RDMA and Python
import rdma: zero-copy networking with RDMA and Pythonimport rdma: zero-copy networking with RDMA and Python
import rdma: zero-copy networking with RDMA and Pythongroveronline
 
CETH for XDP [Linux Meetup Santa Clara | July 2016]
CETH for XDP [Linux Meetup Santa Clara | July 2016] CETH for XDP [Linux Meetup Santa Clara | July 2016]
CETH for XDP [Linux Meetup Santa Clara | July 2016]
IO Visor Project
 
SOC Peripheral Components & SOC Tools
SOC Peripheral Components & SOC ToolsSOC Peripheral Components & SOC Tools
SOC Peripheral Components & SOC Tools
A B Shinde
 
Intelligence at scale through AI model efficiency
Intelligence at scale through AI model efficiencyIntelligence at scale through AI model efficiency
Intelligence at scale through AI model efficiency
Qualcomm Research
 
A deep dive into Android OpenSource Project(AOSP)
A deep dive into Android OpenSource Project(AOSP)A deep dive into Android OpenSource Project(AOSP)
A deep dive into Android OpenSource Project(AOSP)
Siji Sunny
 
CCNA Interview questions - Networking
CCNA Interview questions - NetworkingCCNA Interview questions - Networking
CCNA Interview questions - Networking
Rahul E
 
Chips alliance omni xtend overview
Chips alliance omni xtend overviewChips alliance omni xtend overview
Chips alliance omni xtend overview
RISC-V International
 
Embedded Android : System Development - Part III (Audio / Video HAL)
Embedded Android : System Development - Part III (Audio / Video HAL)Embedded Android : System Development - Part III (Audio / Video HAL)
Embedded Android : System Development - Part III (Audio / Video HAL)
Emertxe Information Technologies Pvt Ltd
 
High-Performance Networking Using eBPF, XDP, and io_uring
High-Performance Networking Using eBPF, XDP, and io_uringHigh-Performance Networking Using eBPF, XDP, and io_uring
High-Performance Networking Using eBPF, XDP, and io_uring
ScyllaDB
 

What's hot (20)

LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
 
DPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationDPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway Application
 
BGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN ControllerBGP Traffic Engineering with SDN Controller
BGP Traffic Engineering with SDN Controller
 
DPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet ProcessingDPDK & Layer 4 Packet Processing
DPDK & Layer 4 Packet Processing
 
Building Embedded Linux Full Tutorial for ARM
Building Embedded Linux Full Tutorial for ARMBuilding Embedded Linux Full Tutorial for ARM
Building Embedded Linux Full Tutorial for ARM
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet Processing
 
BPF / XDP 8월 세미나 KossLab
BPF / XDP 8월 세미나 KossLabBPF / XDP 8월 세미나 KossLab
BPF / XDP 8월 세미나 KossLab
 
Cilium - Network security for microservices
Cilium - Network security for microservicesCilium - Network security for microservices
Cilium - Network security for microservices
 
Linux device drivers
Linux device drivers Linux device drivers
Linux device drivers
 
DPDK KNI interface
DPDK KNI interfaceDPDK KNI interface
DPDK KNI interface
 
import rdma: zero-copy networking with RDMA and Python
import rdma: zero-copy networking with RDMA and Pythonimport rdma: zero-copy networking with RDMA and Python
import rdma: zero-copy networking with RDMA and Python
 
CETH for XDP [Linux Meetup Santa Clara | July 2016]
CETH for XDP [Linux Meetup Santa Clara | July 2016] CETH for XDP [Linux Meetup Santa Clara | July 2016]
CETH for XDP [Linux Meetup Santa Clara | July 2016]
 
SOC Peripheral Components & SOC Tools
SOC Peripheral Components & SOC ToolsSOC Peripheral Components & SOC Tools
SOC Peripheral Components & SOC Tools
 
Intelligence at scale through AI model efficiency
Intelligence at scale through AI model efficiencyIntelligence at scale through AI model efficiency
Intelligence at scale through AI model efficiency
 
A deep dive into Android OpenSource Project(AOSP)
A deep dive into Android OpenSource Project(AOSP)A deep dive into Android OpenSource Project(AOSP)
A deep dive into Android OpenSource Project(AOSP)
 
CCNA Interview questions - Networking
CCNA Interview questions - NetworkingCCNA Interview questions - Networking
CCNA Interview questions - Networking
 
Chips alliance omni xtend overview
Chips alliance omni xtend overviewChips alliance omni xtend overview
Chips alliance omni xtend overview
 
Embedded Android : System Development - Part III (Audio / Video HAL)
Embedded Android : System Development - Part III (Audio / Video HAL)Embedded Android : System Development - Part III (Audio / Video HAL)
Embedded Android : System Development - Part III (Audio / Video HAL)
 
High-Performance Networking Using eBPF, XDP, and io_uring
High-Performance Networking Using eBPF, XDP, and io_uringHigh-Performance Networking Using eBPF, XDP, and io_uring
High-Performance Networking Using eBPF, XDP, and io_uring
 

Similar to An introduction to the prpl foundation

October Southern CA Road Shows - Build Safe and Secure Distributed Systems
October Southern CA Road Shows -  Build Safe and Secure Distributed SystemsOctober Southern CA Road Shows -  Build Safe and Secure Distributed Systems
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined InfrastructureRed Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Intel® Software
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
Real-Time Innovations (RTI)
 
OSNF - Open Sensor Network Framework
OSNF - Open Sensor Network FrameworkOSNF - Open Sensor Network Framework
OSNF - Open Sensor Network Framework
Antonio Di Cello
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of Things
Black Duck by Synopsys
 
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Real-Time Innovations (RTI)
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS Healthcare
Mike Rossi
 
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Larry Smarr
 
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Larry Smarr
 
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Larry Smarr
 
"Recent Developments in Khronos Standards for Embedded Vision," a Presentatio...
"Recent Developments in Khronos Standards for Embedded Vision," a Presentatio..."Recent Developments in Khronos Standards for Embedded Vision," a Presentatio...
"Recent Developments in Khronos Standards for Embedded Vision," a Presentatio...
Edge AI and Vision Alliance
 
BKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End StoryBKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End Story
Linaro
 
OFC 2014 Dinesh Dutt
OFC 2014 Dinesh DuttOFC 2014 Dinesh Dutt
OFC 2014 Dinesh Dutt
Cumulus Networks
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Mohammed Adam
 
Global Data Stream Network for Internet of Things
Global Data Stream Network for Internet of ThingsGlobal Data Stream Network for Internet of Things
Global Data Stream Network for Internet of Things
Bhavana Srinivas
 
HKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
HKG15-The Machine: A new kind of computer- Keynote by Dejan MilojicicHKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
HKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
Linaro
 
Designing High performance & Scalable Middleware for HPC
Designing High performance & Scalable Middleware for HPCDesigning High performance & Scalable Middleware for HPC
Designing High performance & Scalable Middleware for HPC
Object Automation
 

Similar to An introduction to the prpl foundation (20)

October Southern CA Road Shows - Build Safe and Secure Distributed Systems
October Southern CA Road Shows -  Build Safe and Secure Distributed SystemsOctober Southern CA Road Shows -  Build Safe and Secure Distributed Systems
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
 
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined InfrastructureRed Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
OSNF - Open Sensor Network Framework
OSNF - Open Sensor Network FrameworkOSNF - Open Sensor Network Framework
OSNF - Open Sensor Network Framework
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of Things
 
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
Build Safe & Secure Distributed Systems - RTI Boston Roadshow- 2014 09 30
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS Healthcare
 
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
 
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
 
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
Panel: Open Infrastructure for an Open Society: OSG, Commercial Clouds, and B...
 
"Recent Developments in Khronos Standards for Embedded Vision," a Presentatio...
"Recent Developments in Khronos Standards for Embedded Vision," a Presentatio..."Recent Developments in Khronos Standards for Embedded Vision," a Presentatio...
"Recent Developments in Khronos Standards for Embedded Vision," a Presentatio...
 
BKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End StoryBKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End Story
 
OFC 2014 Dinesh Dutt
OFC 2014 Dinesh DuttOFC 2014 Dinesh Dutt
OFC 2014 Dinesh Dutt
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Global Data Stream Network for Internet of Things
Global Data Stream Network for Internet of ThingsGlobal Data Stream Network for Internet of Things
Global Data Stream Network for Internet of Things
 
HKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
HKG15-The Machine: A new kind of computer- Keynote by Dejan MilojicicHKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
HKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
 
Designing High performance & Scalable Middleware for HPC
Designing High performance & Scalable Middleware for HPCDesigning High performance & Scalable Middleware for HPC
Designing High performance & Scalable Middleware for HPC
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

An introduction to the prpl foundation

  • 1. Introduction to prpl Art Swift, president prpl Foundation Embedded Linux Conference Europe (ELCE) 2014 10/15/2014
  • 2. Mission ‘prpl’ is an open-source, community-driven, collaborative, non-profit foundation targeting and supporting the MIPS architecture – and open to all – with a focus on enabling next-generation datacenter-to-device portable software and virtualized architectures Introduction October 14, 2014 to prpl – ELCE 2014 2
  • 3. Our founding members Introduction October 14, 2014 to prpl – ELCE 2014 3
  • 4. prpl core strategies Introduction October 14, 2014 to prpl – ELCE 2014 4
  • 5. Why open-source? • Enabling the IoT and Big Data revolution needs collaborative minds • Fragmentation will slow down innovation • More eyeballs = more secure • Community benefits – Large ROI benefit – up to 4x gain – Time-to-Market & lower TCO – Stronger ecosystem – Faster innovation through focus on core competency Introduction October 14, 2014 to prpl – ELCE 2014 5
  • 6. Our initial PEGs (prpl Engineering Groups) Introduction October 14, 2014 to prpl – ELCE 2014 6
  • 7. What’s coming next? Tools and Tool Chains Secure Hypervisors Prpl Stamp Hardware Certification Program Fully tested, open source supported, development HW from prpl partners for different markets CI20 – a great example from Imagination! Introduction October 14, 2014 to prpl – ELCE 2014 7
  • 8. prpl engineering work ▪ Virtualization Ecosystem ▪ Hypervisors (eg KVM, Fiasco.oc) ▪ OS ▪ Data Center – Redhat, Ubuntu, Debian, CentOS ▪ Networking –Montavista, OpenWrt ▪ Embedded/IoT & Mobile - Android, Chromium, Tizen, WebOS, RTOSs, Yocto ▪ Kernel (device tree, power mgmt, multi-threading) ▪ Portability ▪ JITs (V8, openJDK, etc) ▪ Emulation (QEMU) ▪ Tools (SDK, IDE) ▪ Platform ▪ UEFI and boot loaders ▪ Optimization ▪ Intrinsics (eg SIMD) and libraries (eg memcpy) – ■ Multimedia - video, audio, speech ■ Networking ■ Security ■ Networking (multi-core friendly and aynchronous) ■ e.g. BGP, OVS, snort, routing protocols, DPI Introduction October 14, 2014 to prpl – ELCE 2014 8
  • 9. Introduction October 14, 2014 to prpl – ELCE 2014 9
  • 10. Portability, Virtualization, and Compute Context: What is the vision for prpl and what is driving our decisions? Introduction October 14, 2014 to prpl – ELCE 2014 10
  • 11. The diverse and insecure IOT world! Which will generate and transmit Mountains of Data! Introduction October 14, 2014 to prpl – ELCE 2014 11
  • 12. Diversity and Big Data: The Internet of Cow 1.5B cows 200MB/yr/cow = 300,000 GB (0.3 petabytes) per year Introduction October 14, 2014 to prpl – ELCE 2014 12
  • 13. Diversity and Big Data: Turbines 12,000 turbines 500GB/day each = 6 million GB (6 petabytes) per day Introduction October 14, 2014 to prpl – ELCE 2014 13
  • 14. Little Data  Big Data  Huge Data • Each successive node in the IoT chain adds – Data and Storage requirements – Processing Requirements – Multi-tenant Requirements (i.e. security) Bytes Megabytes Terabytes Petabytes Exabytes ZETTABYTES (1000^7) Introduction October 14, 2014 to prpl – ELCE 2014 14
  • 15. Key Enablers for IoT • Processing power • Networking infrastructure and connectivity • Low cost, secure devices • Storage • Loads and loads of secure, portable software • A way to make money Introduction October 14, 2014 to prpl – ELCE 2014 15
  • 16. IoT Market Challenges • Scale – Billions of devices (identity & authentication management, in-field updates, dynamic interactions, big data, real time data mgmt.) • Multiple technologies and standards – Creation of technology silos – Established / emerging / competing – Standardization is a key enabler • Solutions are highly fragmented – Need for common/flexible platforms – Applications environments with multiple PKIs or Roots of Trust • Low power requirements – Operate for 2 years on a coin battery • Cost limitation • Long life cycles Security Introduction October 14, 2014 to prpl – ELCE 2014 16
  • 17. Introduction October 14, 2014 to prpl – ELCE 2014 17
  • 18. Introduction October 14, 2014 to prpl – ELCE 2014 18
  • 19. More connected homes, more problems • “Smart refrigerators and TVs hacked to send out spam …” – NBC news • If hackers can exploit a weakness in a single type of Internet-connected home appliance or system—such as an Internet-connected door lock—they may be able to harm thousands of people at once. Introduction October 14, 2014 to prpl – ELCE 2014 19
  • 20. Target Breach: an anatomy $200M cost, CEO ousted 1 HVAC systems Compromised credentials from HVAC vendor monitor temp. changes for seeing how long customers stay 2 Malware programs installed on HVAC systems 3 Unified backend systems at store (and most retailers) 4 PoS system breached 5 Millions of credit card numbers start flowing out 6 Breach detected! Manual intervention was needed 7 Introduction October 14, 2014 to prpl – ELCE 2014 20
  • 21. IoT Security Chain (device-to-datacenter) Sensors Nodes Aggregation Points Routers /Gateways STBs Cloud HW Root of Trust + Secure Boot => Secure Over The Air/Wired Field Updates Secure sensor data for sensitive applications (e.g. medical, industrial, enterprise) Enable in field device personalization (add/remove features) Future proof designs with flexible programmable architecture Private Data Disposal Secure Server + Secure Network => Secure Services Secure Remote Monitoring Protect Intellectual Property against SW cloning (e.g. proprietary algorithms) Intellectual Property Tampering Detection Intrusion Detection and Secure Remote Monitoring Introduction October 14, 2014 to prpl – ELCE 2014 21
  • 22. Platform security – one approach Through hardware virtualization support and secure hypervisors • Secure boot process starts out in ROM • After bootloader, the root of trust (hypervisor) is verified and loaded • Iteratively verifies next stage of boot until HLOS (optionally inclusive) • Secure partition(s) able to access full memory map. Non-secure can access only its partition. Non-Secure App Non-Secure App Non-Secure App Non-secure HLOS (e.g. Android) Secure App 1 Secure App 2 Secure OS 1 Secure App 3 Secure & Protected Hypervisor Virtualized N-core MIPS i6400 CPU Virtualized I/O and Memory thru entire SoC Complex Secure OS 2 Introduction October 14, 2014 to prpl – ELCE 2014 22
  • 23. Exploring Virtualization Multiple Secure Domains More Reliable & Predictable Secure Hypervisor CPU 1 CPU 2 CPU 3 CPU 4 CPU 1 Secure Monitor CPU 2 CPU 3 CPU 4 Secure Hypervisor CPU 1 CPU 2 CPU 3 CPU 4 CPU 2 CPU 3 CPU 4 More Powerful & Efficient Safer! CPU 1 • Global Platform considering certifiable containers Secure Monitor • Secure services can only affect their container, not the overall system CPU 1 Secure Hypervisor CPU 2 CPU 3 CPU 4 CPU 1 Secure Monitor CPU 2 CPU 3 CPU 4 Introduction October 14, 2014 to prpl – ELCE 2014 23
  • 24. Summary: what will prpl do? • Focus on the software “glue” necessary to carry secure structured and unstructured data from the device to the datacenter • Example: – Secure hypervisors for multiple tenants – Portable software, such as JITs – SaaS, PaaS, IaaS OTA secure – Programming models to enable big data processing (eg hadoop) over heterogeneous processors Embedded nodes OpenWrt hub Networking backbone Datacenter Introduction October 14, 2014 to prpl – ELCE 2014 24
  • 25. How to Get Involved in prpl Mailing list lists.prplfoundation.org Wiki wiki.prplfoundation.org Forums forum.prplfoundation.org Code github.com/prplfoundation Introduction October 14, 2014 to prpl – ELCE 2014 25
  • 26. Resources • http://prplfoundation.org • http://www.cisco.com/web/about/ac79/docs/in nov/IoE_Economy.pdf • http://theinstitute.ieee.org/benefits/standards/s etting-the-stage-for-the-internet-of-things • FTC Workshop on IoT and Security (Nov ‘13) • art (at) prplfoundation (dot) org Introduction October 14, 2014 to prpl – ELCE 2014 26
  • 27. Thanks! Art Swift, president

Editor's Notes

  1. As we connect more and more devices to the Internet, everything from the thermostat to the toilet to the front door itself may create a potential new opening for electronic intruders. As with computers, there are ways to protect these devices from outsiders, but Crowley and Bryan’s experiences indicate that, for now at least, this isn’t always a primary concern for companies in a rush to sell this equipment. Making devices more secure can add time to product development....
  2. Target may be subject to fines for violating payment card industry data security standards (PCI DSS). However, the current PCI DSS v3.0 states "Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity’s network is not a PCI DSS requirement."
  3. Virtualization provides Hardware firewall-grade security Scalability Reliability Necessary Isolation For secure applications to run on consumer devices