SlideShare a Scribd company logo
1/21
Dominig ar Foll
Senior Software Architect
Intel Open Source
LibreCon 2016, Bilbao, Es dominig.arfoll@fridu.net
Implementing a Security strategy in IoT,
Practical example Automotive Grade Linux
Attacking IoT, a viable business
➢ Ransom model
➢ Stall manufacturing
➢ Immobilise expensive items (e.g. your car)
➢ …
➢ Competitive advantage
➢ Collecting R&D, manufacturing data
➢ Disturbing production line
➢ Indirect
➢ Cheap robot for DDoS
➢ Easy entry point
3/21
Understanding the risks
Developer
Fix all possible weaknesses
Deactivate possible users errors
LTS assumed for free
Back Hat
Only need one security hole
Can be help by careless users
Good long term business opportunities
Good international network
4/21
Security fundamentals
Minimise surface of attack
Control the code which is run
Provide a bullet proof update model
Track security patches
Use HW security helpers when available
Limit lateral movement in the system
Develop and QA with security turned on
Do not rely on human but on platform and tools
Security cannot be added after the fact
Do not rely on human
➢ Security experts are out of reach
➢ 9M Mobile Developers
➢ 8M Web Developers
➢ 0.5M Embedded Developers
➢ How many Embedded Security
Developers ?
➢ Human are unreliable
➢ We do not have the time now
➢ Oups, it’s too late to change it
➢ No one is interested by our system
➢ We are too small
➢ ...
6/21
Concepts are Known
but what about implementation?
EPID
ID Management
EPID
ID Management
TPM
Private/Secure Store
TPM
Private/Secure Store
UEFI
Secured Boot
UEFI
Secured Boot
Linux Kernel with up-to-date patchesLinux Kernel with up-to-date patches
SoC Specific drivers
Harden OS servicesHarden OS services
Mandatory Access Control
Integrity
Name Space
Firewall
Safe update
Encryption
ID/Key protection
APIAPI
Untrusted Apps / MiddlewareUntrusted Apps / Middleware Full isolation
Signing
Repo create
Debug
Customize
SoC Drivers
Signing
Repo create
Debug
Customize
SoC Drivers
Default policies
Debug
Sample code
HowTo
Default policies
Debug
Sample code
HowTo
AppFW
App Debug
App Packaging
AppFW
App Debug
App Packaging
Tools-DocTools-Doc Software running onTargetSoftware running onTarget
7/21
Know who/what you trust
➢ Trusted Boot : a MUST Have Feature
➢ Leverage hardware capabilities
➢ Small series & developer key handling
➢ Application Installation
➢ Verify integrity
➢ Verify origin
➢ Request User Consent [privacy & permissions]
➢ Update
➢ Only signed updates with a trusted origin
➢ Secured updates on compromised devices are a no-go option
➢ Factory reset built-in from a trusted zone
➢ Do not let back doors opened via containers
➢ Strict control of custom drivers [in kernel mode everything is possible]
8/21
Layered Architecture
➢ Client/UI (untrusted)
➢ Risk of code injection (HTML5/QML)
➢ UI on external devices (Mobiles, Tablets)
➢ Access to secure service APIs [REST/WS]
➢ Applications & Services (semi-trusted)
➢ Unknown developers & Multi-source
➢ High-grain protection by Linux DAC & MAC labels.
➢ Run under control of Application Framework: need to provide a
security manifest
➢ Platform & System services (trusted)
➢ Message Services started by systemd
➢ Service and API fine grain privilege protection
➢ Part of baseline distribution and certified services only
9/21
Bullet proof update and ID
Update is the only possible correction
l
Must run safely on compromised devices
l
Cannot assume a know starting point
Compromised ID / keys has no return
l
Per device unique ID
l
Per device symmetric keys
l
Use HW ID protection (e.g. EPID)
Non reproducibility
l
Breaking in one device cannot be extended
l
Development I/O are disabled
l
Root password is unique (or better a key)
l
Password cannot be easily recalculated
10/21
A practical example (AGL)
Applicable to any Industrial IoT Linux
11/21
Service isolation
Run services with UID<>0 SystemD is your friend
l
Create dedicated UID per service
l
Use Linux MAC and Smack DAC to minimise open Access
Drop privileges
l
Posix privileges
l
MAC privileges
C-goups
l
Reduce offending power
l
RAM/CPU/IO
Name Space
l
Limit access to private data
l
Limit access to connectivity
https://www.kernel.org/doc/Documentation/cgroups/cgroups.txt
https://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/capfaq-0.2.txt
http://man7.org/linux/man-pages/man7/namespaces.7.html
https://en.wikipedia.org/wiki/Mandatory_access_control
https://en.wikipedia.org/wiki/Discretionary_access_control
12/21
Segregate Apps from OS
➢ Application Manager
➢ One system daemon for application live cycle installs, update, delete
➢ One user daemon per user for application start, stop, pause, resume
➢ Create initial share secret between UI and Binder
➢ Spawn and controls application processes: binder, UI, …
➢ Security Manager
➢ Responsible of privilege enforcement
➢ Based on Cynara + WebSocket and D-Bus for Legacy)
➢ Application & Services Binders
➢ Expose platform APIs to UI, Services, Applications
➢ Loads services/application plugins :Audio, Canbus, Media Server…
➢ One private binder per application/services [REST, WebSocket, Dbus]
➢ Authenticate UI by oAuth token type
➢ Secured by SMACK label + UID/GIDs
➢ AppBinders runs under user $HOME
13/21
AGL2 Application Security
Agent-2
Car Environement
Agent-3
Engine
Agent-4
Remote Signal
CAN Bus-A
LIN Bus-A
Audio
CAN Bus-B
Cluster-Unit
...
Smart City
RVI
Cloud
Transport + Acess Control
Navigation
Service
Carte handling
POI management
etc...
Log/Supervision
Service
Carte handling
POI management
etc...
MultiMedia
Service
Media Player
Radio Interface
etc...
Distributed Application Architecture
MAC
Enforcement
Smack
Cgroups
NameSpace
Containers
Application Framwork Live Cycle Management
Start,Stop,Pause,Install,Remove,...
14/21
AGL2 AppFW logic
15/21
To write an App
➢ Write back-end binding
➢ Adds the specialised API to the system
➢ Accessible by Web Socket or slow legacy D-Bus
➢ Run in its own security domain
➢ Can be cascaded
➢ Write the Front end
➢ Typically in HTML5, QML but open to any
➢ Connect to back-end binding using REST with secured key (OAuth2)
➢
➢ Package
➢ Based on W3C widget
➢ Feature allow to handle AGL specificities
➢ Install via the AppFW
16/21
AGL2+ Distributed Architecture
Cluster
Carte handling
Localistion management
POI
CAN GPS
Geopositioning
Virtual
Signal
Multi ECU & Cloud Aware Architecture
Entertainement
CAN-BUS
Virtual Signal
Gyro, AcelerometerCAN-BUS
LIN-BUS
Engine-CAN-BUS
ABS
Transport & ACL
Head Unix
Direction Indication
Cloud
Log
Analytics
No-SQL Engine
Statistics & Analytics
Transport & ACL
My Car Portal
Paiement
Subcriptions
Preference
Preferences
&
Custumisation
MongoDB Engine
Paiement Service
Cluster
Virtual Signal
Transport & ACL
Navigation
Service
Maintenance Portal
Know Bugs
Maintenances
Service Packs
17/21
AGL2++ Virtualised Architecture
Hardware
Trusted
Zone
Hypervisor
MorePrivilegesLessPrivileges
AGL Linux Kernel
Guest Operating
Linux-RT/Microkernel
Guest Operating
AGL Core
Plateform Services
AGL Extra
Middleware
AGLApp-1
AGLApp-2
AGLApp-3
DomU Entertainment
App-1
App-2
AGL Mini
Plateform Services
DomU Cluster
Trusted Apps
AGL Linux
Supervisor
PKIsafeStore
Integretycontrol
Ressources
Alloc/Porxy
Emergency
Services
Trusted
Boot
DOM0 controller
Virt
GPU
Virt
Audio
Virt
GPU
Virt
Audio
Diagnistics
Virtualized Secure Architecture
Container
18/21
Conclusion
➢ Technologies are available
➢ Secure boot, Secure zone
➢ Update over the air
➢ Isolation and containment
➢ Tools and training
➢ Management is not ready
➢ Still perceived as a nice to have
➢ Too risky to commit
➢ Engineering sees security as a brake to innovation
➢ Requires a serious personal investment and paradigm shift
➢ Complexity imposes to select a “Ready Made” solution
➢ AGL, Tizen, Snappy, ...
➢ “Will add it later” attitude is common but a guaranteed model to failure
Questions
LibreCon 2016, Bilbao, Es dominig.arfoll@fridu.net
Golfe Morbihan, South Brittany
20/21
Container "A mixed blessing"
Easy to use
l
Detach the App from the platform
l
Integrated App management
l
Well known
Not very secure
l
Unreliable introspection
l
MAC has no power on the inside of a container
l
Updating the platform does not update the
l
middleware
l
Beside the Kernel each App provide its own version
l
of the OS
l
Each App restart requires a full passing of credential
l
RAM and Flash footprint are uncontrollable
l
Far more secured with Clear Container but not applicable to low end SoC.
Only I/O via network
l
Well equipped for Rest API
l
All other I/O requires driver level access or bespoke framework.
https://www.opencontainers.org/
https://lwn.net/Articles/644675/
21/21
Security Check list
Control which code you run
l
Secure boot
l
Integrity
l
Secure update
Isolate services
l
Drop root when possible
l
Drop privileges
Isolate Apps
l
Apps are not the OS
l
Enforce – restrict access to standard API
Identity
l
Enforce identity unicity
l
Use available HW protection
Encryption
l
Network traffic
l
Local storage
Control image creation
l
No debug tool in production
l
No default root password
l
No unrequired open port
Continuous integration
l
Automate static analysis
l
QA on secured image
Help developer
l
Integrate security in Devel image
l
Provide clear guide line
l
Isolate Apps from OS
l
Focus on standardised Middleware

More Related Content

What's hot

FIWARE MEXICO WorkShop 2016 - 3. FIWARE: Open APIs for Open Cities
FIWARE MEXICO WorkShop 2016 - 3. FIWARE: Open APIs for Open CitiesFIWARE MEXICO WorkShop 2016 - 3. FIWARE: Open APIs for Open Cities
FIWARE MEXICO WorkShop 2016 - 3. FIWARE: Open APIs for Open Cities
FIWARE Mexico
 
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE Mexico
 
FIWARE MEXICO WorkShop 2016 - 6. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 6. Ongoing & future FIWARE activities in Mexico...FIWARE MEXICO WorkShop 2016 - 6. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 6. Ongoing & future FIWARE activities in Mexico...
FIWARE Mexico
 
Intro to the Big Data Spain 2014 conference
Intro to the Big Data Spain 2014 conferenceIntro to the Big Data Spain 2014 conference
Intro to the Big Data Spain 2014 conference
Big Data Spain
 
DevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon London 2018: A Journey to Continuous Cloud ComplianceDevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon
 
FIWARE MEXICO WorkShop 2016 - 4. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 4. Ongoing & future FIWARE activities in Mexico...FIWARE MEXICO WorkShop 2016 - 4. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 4. Ongoing & future FIWARE activities in Mexico...
FIWARE Mexico
 
Machine Learning at E*Trade
Machine Learning at E*TradeMachine Learning at E*Trade
Machine Learning at E*Trade
Elasticsearch
 
FI-LAB for Smart Cities
FI-LAB for Smart CitiesFI-LAB for Smart Cities
FI-LAB for Smart Cities
FIWARE
 
Fiware IoT_intro&scenarios
Fiware IoT_intro&scenariosFiware IoT_intro&scenarios
Fiware IoT_intro&scenarios
FIWARE
 
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon
 
DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon London 2018: Whatever happened to attack aware applications?DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon
 
CDE Catapult by Maurizio Pilu - Cambridge Wireless Event - 28 Nov 2013
CDE Catapult by Maurizio Pilu - Cambridge Wireless Event - 28 Nov 2013CDE Catapult by Maurizio Pilu - Cambridge Wireless Event - 28 Nov 2013
CDE Catapult by Maurizio Pilu - Cambridge Wireless Event - 28 Nov 2013Maurizio Pilu
 
Practical Applications of Blockchain Technology in the Certification Industry
Practical Applications of Blockchain Technology in the Certification IndustryPractical Applications of Blockchain Technology in the Certification Industry
Practical Applications of Blockchain Technology in the Certification Industry
Intact GmbH
 
FIWARE Zone
FIWARE Zone FIWARE Zone
FIWARE Zone
FIWARE
 
FIWARE Overview (University Cairo 20Aug2017)
FIWARE Overview (University Cairo 20Aug2017)FIWARE Overview (University Cairo 20Aug2017)
FIWARE Overview (University Cairo 20Aug2017)
FIWARE
 
The City of Paris and Open Source Software, Paris Open Source Summit 2017
The City of Paris and Open Source Software, Paris Open Source Summit 2017The City of Paris and Open Source Software, Paris Open Source Summit 2017
The City of Paris and Open Source Software, Paris Open Source Summit 2017
OW2
 
Airport as a Smartcity - Naftemporiki IoT 2016
Airport as a Smartcity - Naftemporiki IoT 2016Airport as a Smartcity - Naftemporiki IoT 2016
Airport as a Smartcity - Naftemporiki IoT 2016
Manolis Nikiforakis
 
CHOReVOLUTION, An IDRE for IoT-enabled applications, Sébastien Keller, Thales...
CHOReVOLUTION, An IDRE for IoT-enabled applications, Sébastien Keller, Thales...CHOReVOLUTION, An IDRE for IoT-enabled applications, Sébastien Keller, Thales...
CHOReVOLUTION, An IDRE for IoT-enabled applications, Sébastien Keller, Thales...
OW2
 

What's hot (19)

FIWARE MEXICO WorkShop 2016 - 3. FIWARE: Open APIs for Open Cities
FIWARE MEXICO WorkShop 2016 - 3. FIWARE: Open APIs for Open CitiesFIWARE MEXICO WorkShop 2016 - 3. FIWARE: Open APIs for Open Cities
FIWARE MEXICO WorkShop 2016 - 3. FIWARE: Open APIs for Open Cities
 
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 5. Ongoing & future FIWARE activities in Mexico...
 
FIWARE MEXICO WorkShop 2016 - 6. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 6. Ongoing & future FIWARE activities in Mexico...FIWARE MEXICO WorkShop 2016 - 6. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 6. Ongoing & future FIWARE activities in Mexico...
 
Intro to the Big Data Spain 2014 conference
Intro to the Big Data Spain 2014 conferenceIntro to the Big Data Spain 2014 conference
Intro to the Big Data Spain 2014 conference
 
DevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon London 2018: A Journey to Continuous Cloud ComplianceDevSecCon London 2018: A Journey to Continuous Cloud Compliance
DevSecCon London 2018: A Journey to Continuous Cloud Compliance
 
FIWARE MEXICO WorkShop 2016 - 4. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 4. Ongoing & future FIWARE activities in Mexico...FIWARE MEXICO WorkShop 2016 - 4. Ongoing & future FIWARE activities in Mexico...
FIWARE MEXICO WorkShop 2016 - 4. Ongoing & future FIWARE activities in Mexico...
 
Machine Learning at E*Trade
Machine Learning at E*TradeMachine Learning at E*Trade
Machine Learning at E*Trade
 
FI-LAB for Smart Cities
FI-LAB for Smart CitiesFI-LAB for Smart Cities
FI-LAB for Smart Cities
 
Fiware IoT_intro&scenarios
Fiware IoT_intro&scenariosFiware IoT_intro&scenarios
Fiware IoT_intro&scenarios
 
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
 
DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon London 2018: Whatever happened to attack aware applications?DevSecCon London 2018: Whatever happened to attack aware applications?
DevSecCon London 2018: Whatever happened to attack aware applications?
 
DevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heelDevSecCon London 2018: Is your supply chain your achille's heel
DevSecCon London 2018: Is your supply chain your achille's heel
 
CDE Catapult by Maurizio Pilu - Cambridge Wireless Event - 28 Nov 2013
CDE Catapult by Maurizio Pilu - Cambridge Wireless Event - 28 Nov 2013CDE Catapult by Maurizio Pilu - Cambridge Wireless Event - 28 Nov 2013
CDE Catapult by Maurizio Pilu - Cambridge Wireless Event - 28 Nov 2013
 
Practical Applications of Blockchain Technology in the Certification Industry
Practical Applications of Blockchain Technology in the Certification IndustryPractical Applications of Blockchain Technology in the Certification Industry
Practical Applications of Blockchain Technology in the Certification Industry
 
FIWARE Zone
FIWARE Zone FIWARE Zone
FIWARE Zone
 
FIWARE Overview (University Cairo 20Aug2017)
FIWARE Overview (University Cairo 20Aug2017)FIWARE Overview (University Cairo 20Aug2017)
FIWARE Overview (University Cairo 20Aug2017)
 
The City of Paris and Open Source Software, Paris Open Source Summit 2017
The City of Paris and Open Source Software, Paris Open Source Summit 2017The City of Paris and Open Source Software, Paris Open Source Summit 2017
The City of Paris and Open Source Software, Paris Open Source Summit 2017
 
Airport as a Smartcity - Naftemporiki IoT 2016
Airport as a Smartcity - Naftemporiki IoT 2016Airport as a Smartcity - Naftemporiki IoT 2016
Airport as a Smartcity - Naftemporiki IoT 2016
 
CHOReVOLUTION, An IDRE for IoT-enabled applications, Sébastien Keller, Thales...
CHOReVOLUTION, An IDRE for IoT-enabled applications, Sébastien Keller, Thales...CHOReVOLUTION, An IDRE for IoT-enabled applications, Sébastien Keller, Thales...
CHOReVOLUTION, An IDRE for IoT-enabled applications, Sébastien Keller, Thales...
 

Viewers also liked

Learning notes on Open Source License
Learning notes on Open Source License Learning notes on Open Source License
Learning notes on Open Source License
SZ Lin
 
y2038 issue
y2038 issuey2038 issue
y2038 issue
SZ Lin
 
淺談 Live patching technology
淺談 Live patching technology淺談 Live patching technology
淺談 Live patching technology
SZ Lin
 
TIZEN Application Validation
TIZEN Application ValidationTIZEN Application Validation
TIZEN Application Validation
Ryo Jin
 
Distributed Compiler Icecc
Distributed Compiler IceccDistributed Compiler Icecc
Distributed Compiler Icecc
SZ Lin
 
Fast boot
Fast bootFast boot
Fast boot
SZ Lin
 
Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016
SZ Lin
 
Debian 套件打包教學指南 - 繁體中文翻譯
Debian 套件打包教學指南 - 繁體中文翻譯Debian 套件打包教學指南 - 繁體中文翻譯
Debian 套件打包教學指南 - 繁體中文翻譯
SZ Lin
 
Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...
Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...
Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...
Leon Anavi
 
Debian 套件打包教學指南 v0.19 - 繁體中文翻譯
Debian 套件打包教學指南 v0.19 - 繁體中文翻譯Debian 套件打包教學指南 v0.19 - 繁體中文翻譯
Debian 套件打包教學指南 v0.19 - 繁體中文翻譯
SZ Lin
 
Introduction to Optee (26 may 2016)
Introduction to Optee (26 may 2016)Introduction to Optee (26 may 2016)
Introduction to Optee (26 may 2016)
Yannick Gicquel
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
Linaro
 
Q4.11: Introduction to eMMC
Q4.11: Introduction to eMMCQ4.11: Introduction to eMMC
Q4.11: Introduction to eMMC
Linaro
 
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
Linaro
 
Embedded Linux/ Debian with ARM64 Platform
Embedded Linux/ Debian with ARM64 PlatformEmbedded Linux/ Debian with ARM64 Platform
Embedded Linux/ Debian with ARM64 Platform
SZ Lin
 

Viewers also liked (15)

Learning notes on Open Source License
Learning notes on Open Source License Learning notes on Open Source License
Learning notes on Open Source License
 
y2038 issue
y2038 issuey2038 issue
y2038 issue
 
淺談 Live patching technology
淺談 Live patching technology淺談 Live patching technology
淺談 Live patching technology
 
TIZEN Application Validation
TIZEN Application ValidationTIZEN Application Validation
TIZEN Application Validation
 
Distributed Compiler Icecc
Distributed Compiler IceccDistributed Compiler Icecc
Distributed Compiler Icecc
 
Fast boot
Fast bootFast boot
Fast boot
 
Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016Cellular technology with Embedded Linux - COSCUP 2016
Cellular technology with Embedded Linux - COSCUP 2016
 
Debian 套件打包教學指南 - 繁體中文翻譯
Debian 套件打包教學指南 - 繁體中文翻譯Debian 套件打包教學指南 - 繁體中文翻譯
Debian 套件打包教學指南 - 繁體中文翻譯
 
Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...
Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...
Contributing to Automotive Grade Linux (AGL) and GENIVI Development Platform ...
 
Debian 套件打包教學指南 v0.19 - 繁體中文翻譯
Debian 套件打包教學指南 v0.19 - 繁體中文翻譯Debian 套件打包教學指南 v0.19 - 繁體中文翻譯
Debian 套件打包教學指南 v0.19 - 繁體中文翻譯
 
Introduction to Optee (26 may 2016)
Introduction to Optee (26 may 2016)Introduction to Optee (26 may 2016)
Introduction to Optee (26 may 2016)
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
 
Q4.11: Introduction to eMMC
Q4.11: Introduction to eMMCQ4.11: Introduction to eMMC
Q4.11: Introduction to eMMC
 
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
LAS16-111: Easing Access to ARM TrustZone – OP-TEE and Raspberry Pi 3
 
Embedded Linux/ Debian with ARM64 Platform
Embedded Linux/ Debian with ARM64 PlatformEmbedded Linux/ Debian with ARM64 Platform
Embedded Linux/ Debian with ARM64 Platform
 

Similar to Implementing a Security strategy in IoT, Practical example Automotive Grade Linux - LibreCon 2016

UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
Satya Harish
 
Why Pay for Open Source Linux? Avoid the Hidden Cost of DIY
Why Pay for Open Source Linux? Avoid the Hidden Cost of DIYWhy Pay for Open Source Linux? Avoid the Hidden Cost of DIY
Why Pay for Open Source Linux? Avoid the Hidden Cost of DIY
Enterprise Management Associates
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
Panda Security
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
RISC-V International
 
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdfDesigning and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
ICS
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Codemotion
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
Ron Munitz
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
Nugroho Gito
 
OWASP Brisbane - SDN Security
OWASP Brisbane - SDN SecurityOWASP Brisbane - SDN Security
OWASP Brisbane - SDN Security
David Jorm
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
lior mazor
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
Eric Larcheveque
 
Top 5 benefits of docker
Top 5 benefits of dockerTop 5 benefits of docker
Top 5 benefits of docker
John Zaccone
 
Securing application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environmentsSecuring application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environments
Binu Ramakrishnan
 
Mender.io | Securing the Connected Car
Mender.io | Securing the Connected CarMender.io | Securing the Connected Car
Mender.io | Securing the Connected Car
Mender.io
 
Software update for embedded systems
Software update for embedded systemsSoftware update for embedded systems
Software update for embedded systems
SZ Lin
 
How to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at ScaleHow to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at Scale
DevOps.com
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
Digital Bond
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edge
John Archer
 

Similar to Implementing a Security strategy in IoT, Practical example Automotive Grade Linux - LibreCon 2016 (20)

UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
 
Why Pay for Open Source Linux? Avoid the Hidden Cost of DIY
Why Pay for Open Source Linux? Avoid the Hidden Cost of DIYWhy Pay for Open Source Linux? Avoid the Hidden Cost of DIY
Why Pay for Open Source Linux? Avoid the Hidden Cost of DIY
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdfDesigning and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
OWASP Brisbane - SDN Security
OWASP Brisbane - SDN SecurityOWASP Brisbane - SDN Security
OWASP Brisbane - SDN Security
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
Top 5 benefits of docker
Top 5 benefits of dockerTop 5 benefits of docker
Top 5 benefits of docker
 
Securing application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environmentsSecuring application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environments
 
Mender.io | Securing the Connected Car
Mender.io | Securing the Connected CarMender.io | Securing the Connected Car
Mender.io | Securing the Connected Car
 
Software update for embedded systems
Software update for embedded systemsSoftware update for embedded systems
Software update for embedded systems
 
How to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at ScaleHow to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at Scale
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Locationless data science on a modern secure edge
Locationless data science on a modern secure edgeLocationless data science on a modern secure edge
Locationless data science on a modern secure edge
 

More from LibreCon

Inteligencia del dato aplicada al negocio de las telecomunicaciones - LibreCo...
Inteligencia del dato aplicada al negocio de las telecomunicaciones - LibreCo...Inteligencia del dato aplicada al negocio de las telecomunicaciones - LibreCo...
Inteligencia del dato aplicada al negocio de las telecomunicaciones - LibreCo...
LibreCon
 
Cómo aumentar los ratios de conversión de tu negocio en el canal telefónico -...
Cómo aumentar los ratios de conversión de tu negocio en el canal telefónico -...Cómo aumentar los ratios de conversión de tu negocio en el canal telefónico -...
Cómo aumentar los ratios de conversión de tu negocio en el canal telefónico -...
LibreCon
 
La plataforma cloud Opensource abierta a toda la industria - LibreCon 2016
La plataforma cloud Opensource abierta a toda la industria - LibreCon 2016La plataforma cloud Opensource abierta a toda la industria - LibreCon 2016
La plataforma cloud Opensource abierta a toda la industria - LibreCon 2016
LibreCon
 
Privacy shield, la nueva realidad en la industria 4.0 - LibreCon 2016
Privacy shield, la nueva realidad en la industria 4.0 - LibreCon 2016Privacy shield, la nueva realidad en la industria 4.0 - LibreCon 2016
Privacy shield, la nueva realidad en la industria 4.0 - LibreCon 2016
LibreCon
 
Samsung y su firme apuesta por el Software Libre - LibreCon 2016
Samsung y su firme apuesta por el Software Libre - LibreCon 2016Samsung y su firme apuesta por el Software Libre - LibreCon 2016
Samsung y su firme apuesta por el Software Libre - LibreCon 2016
LibreCon
 
Cómo usar inteligencia competitiva para subirse a la ola de las tecnologías e...
Cómo usar inteligencia competitiva para subirse a la ola de las tecnologías e...Cómo usar inteligencia competitiva para subirse a la ola de las tecnologías e...
Cómo usar inteligencia competitiva para subirse a la ola de las tecnologías e...
LibreCon
 
Beneficios de aplicar la tecnología open a tu proyecto digital - LibreCon 2016
Beneficios de aplicar la tecnología open a tu proyecto digital - LibreCon 2016Beneficios de aplicar la tecnología open a tu proyecto digital - LibreCon 2016
Beneficios de aplicar la tecnología open a tu proyecto digital - LibreCon 2016
LibreCon
 
Software libre como habilitador en la Industrua 4.0 - LibreCon 2016
Software libre como habilitador en la Industrua 4.0 - LibreCon 2016Software libre como habilitador en la Industrua 4.0 - LibreCon 2016
Software libre como habilitador en la Industrua 4.0 - LibreCon 2016
LibreCon
 
BATEAN, caminando hacia la Industria 4.0 - LibreCon 2016
BATEAN, caminando hacia la Industria 4.0 - LibreCon 2016BATEAN, caminando hacia la Industria 4.0 - LibreCon 2016
BATEAN, caminando hacia la Industria 4.0 - LibreCon 2016
LibreCon
 
Open Source in robotics and its business - LibreCon 2016
Open Source in robotics and its business - LibreCon 2016Open Source in robotics and its business - LibreCon 2016
Open Source in robotics and its business - LibreCon 2016
LibreCon
 
Kappa Architecture, IoT of the cars - LibreCon 2016
Kappa Architecture, IoT of the cars - LibreCon 2016Kappa Architecture, IoT of the cars - LibreCon 2016
Kappa Architecture, IoT of the cars - LibreCon 2016
LibreCon
 
Fabricación aditiva de componentes industriales - LibreCon 2016
Fabricación aditiva de componentes industriales - LibreCon 2016Fabricación aditiva de componentes industriales - LibreCon 2016
Fabricación aditiva de componentes industriales - LibreCon 2016
LibreCon
 
Software Libre por los aires, el caso de AENA
Software Libre por los aires, el caso de AENASoftware Libre por los aires, el caso de AENA
Software Libre por los aires, el caso de AENA
LibreCon
 
Industry 4.0 y Big Data. ¿Quién está accediendo a tus datos? - LibreCon 2016
Industry 4.0 y Big Data. ¿Quién está accediendo a tus datos? - LibreCon 2016Industry 4.0 y Big Data. ¿Quién está accediendo a tus datos? - LibreCon 2016
Industry 4.0 y Big Data. ¿Quién está accediendo a tus datos? - LibreCon 2016
LibreCon
 
A sustainable economic model through contributors to Libre/Free Software comm...
A sustainable economic model through contributors to Libre/Free Software comm...A sustainable economic model through contributors to Libre/Free Software comm...
A sustainable economic model through contributors to Libre/Free Software comm...
LibreCon
 
Un modelo económicamente sostenible a través de la contribución a comunidades...
Un modelo económicamente sostenible a través de la contribución a comunidades...Un modelo económicamente sostenible a través de la contribución a comunidades...
Un modelo económicamente sostenible a través de la contribución a comunidades...
LibreCon
 
¿En qué se parecen una piedra y un pollo? - LibreCon 2016
¿En qué se parecen una piedra y un pollo? - LibreCon 2016¿En qué se parecen una piedra y un pollo? - LibreCon 2016
¿En qué se parecen una piedra y un pollo? - LibreCon 2016
LibreCon
 
Integración Bigdata: punto de entrada al IoT - LibreCon 2016
Integración Bigdata: punto de entrada al IoT - LibreCon 2016Integración Bigdata: punto de entrada al IoT - LibreCon 2016
Integración Bigdata: punto de entrada al IoT - LibreCon 2016
LibreCon
 
Software libre en la industria de equipamiento médico y tecnología sanitaria ...
Software libre en la industria de equipamiento médico y tecnología sanitaria ...Software libre en la industria de equipamiento médico y tecnología sanitaria ...
Software libre en la industria de equipamiento médico y tecnología sanitaria ...
LibreCon
 
Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016
LibreCon
 

More from LibreCon (20)

Inteligencia del dato aplicada al negocio de las telecomunicaciones - LibreCo...
Inteligencia del dato aplicada al negocio de las telecomunicaciones - LibreCo...Inteligencia del dato aplicada al negocio de las telecomunicaciones - LibreCo...
Inteligencia del dato aplicada al negocio de las telecomunicaciones - LibreCo...
 
Cómo aumentar los ratios de conversión de tu negocio en el canal telefónico -...
Cómo aumentar los ratios de conversión de tu negocio en el canal telefónico -...Cómo aumentar los ratios de conversión de tu negocio en el canal telefónico -...
Cómo aumentar los ratios de conversión de tu negocio en el canal telefónico -...
 
La plataforma cloud Opensource abierta a toda la industria - LibreCon 2016
La plataforma cloud Opensource abierta a toda la industria - LibreCon 2016La plataforma cloud Opensource abierta a toda la industria - LibreCon 2016
La plataforma cloud Opensource abierta a toda la industria - LibreCon 2016
 
Privacy shield, la nueva realidad en la industria 4.0 - LibreCon 2016
Privacy shield, la nueva realidad en la industria 4.0 - LibreCon 2016Privacy shield, la nueva realidad en la industria 4.0 - LibreCon 2016
Privacy shield, la nueva realidad en la industria 4.0 - LibreCon 2016
 
Samsung y su firme apuesta por el Software Libre - LibreCon 2016
Samsung y su firme apuesta por el Software Libre - LibreCon 2016Samsung y su firme apuesta por el Software Libre - LibreCon 2016
Samsung y su firme apuesta por el Software Libre - LibreCon 2016
 
Cómo usar inteligencia competitiva para subirse a la ola de las tecnologías e...
Cómo usar inteligencia competitiva para subirse a la ola de las tecnologías e...Cómo usar inteligencia competitiva para subirse a la ola de las tecnologías e...
Cómo usar inteligencia competitiva para subirse a la ola de las tecnologías e...
 
Beneficios de aplicar la tecnología open a tu proyecto digital - LibreCon 2016
Beneficios de aplicar la tecnología open a tu proyecto digital - LibreCon 2016Beneficios de aplicar la tecnología open a tu proyecto digital - LibreCon 2016
Beneficios de aplicar la tecnología open a tu proyecto digital - LibreCon 2016
 
Software libre como habilitador en la Industrua 4.0 - LibreCon 2016
Software libre como habilitador en la Industrua 4.0 - LibreCon 2016Software libre como habilitador en la Industrua 4.0 - LibreCon 2016
Software libre como habilitador en la Industrua 4.0 - LibreCon 2016
 
BATEAN, caminando hacia la Industria 4.0 - LibreCon 2016
BATEAN, caminando hacia la Industria 4.0 - LibreCon 2016BATEAN, caminando hacia la Industria 4.0 - LibreCon 2016
BATEAN, caminando hacia la Industria 4.0 - LibreCon 2016
 
Open Source in robotics and its business - LibreCon 2016
Open Source in robotics and its business - LibreCon 2016Open Source in robotics and its business - LibreCon 2016
Open Source in robotics and its business - LibreCon 2016
 
Kappa Architecture, IoT of the cars - LibreCon 2016
Kappa Architecture, IoT of the cars - LibreCon 2016Kappa Architecture, IoT of the cars - LibreCon 2016
Kappa Architecture, IoT of the cars - LibreCon 2016
 
Fabricación aditiva de componentes industriales - LibreCon 2016
Fabricación aditiva de componentes industriales - LibreCon 2016Fabricación aditiva de componentes industriales - LibreCon 2016
Fabricación aditiva de componentes industriales - LibreCon 2016
 
Software Libre por los aires, el caso de AENA
Software Libre por los aires, el caso de AENASoftware Libre por los aires, el caso de AENA
Software Libre por los aires, el caso de AENA
 
Industry 4.0 y Big Data. ¿Quién está accediendo a tus datos? - LibreCon 2016
Industry 4.0 y Big Data. ¿Quién está accediendo a tus datos? - LibreCon 2016Industry 4.0 y Big Data. ¿Quién está accediendo a tus datos? - LibreCon 2016
Industry 4.0 y Big Data. ¿Quién está accediendo a tus datos? - LibreCon 2016
 
A sustainable economic model through contributors to Libre/Free Software comm...
A sustainable economic model through contributors to Libre/Free Software comm...A sustainable economic model through contributors to Libre/Free Software comm...
A sustainable economic model through contributors to Libre/Free Software comm...
 
Un modelo económicamente sostenible a través de la contribución a comunidades...
Un modelo económicamente sostenible a través de la contribución a comunidades...Un modelo económicamente sostenible a través de la contribución a comunidades...
Un modelo económicamente sostenible a través de la contribución a comunidades...
 
¿En qué se parecen una piedra y un pollo? - LibreCon 2016
¿En qué se parecen una piedra y un pollo? - LibreCon 2016¿En qué se parecen una piedra y un pollo? - LibreCon 2016
¿En qué se parecen una piedra y un pollo? - LibreCon 2016
 
Integración Bigdata: punto de entrada al IoT - LibreCon 2016
Integración Bigdata: punto de entrada al IoT - LibreCon 2016Integración Bigdata: punto de entrada al IoT - LibreCon 2016
Integración Bigdata: punto de entrada al IoT - LibreCon 2016
 
Software libre en la industria de equipamiento médico y tecnología sanitaria ...
Software libre en la industria de equipamiento médico y tecnología sanitaria ...Software libre en la industria de equipamiento médico y tecnología sanitaria ...
Software libre en la industria de equipamiento médico y tecnología sanitaria ...
 
Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016Banking 4.0 - LibreCon 2016
Banking 4.0 - LibreCon 2016
 

Recently uploaded

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 

Recently uploaded (16)

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 

Implementing a Security strategy in IoT, Practical example Automotive Grade Linux - LibreCon 2016

  • 1. 1/21 Dominig ar Foll Senior Software Architect Intel Open Source LibreCon 2016, Bilbao, Es dominig.arfoll@fridu.net Implementing a Security strategy in IoT, Practical example Automotive Grade Linux
  • 2. Attacking IoT, a viable business ➢ Ransom model ➢ Stall manufacturing ➢ Immobilise expensive items (e.g. your car) ➢ … ➢ Competitive advantage ➢ Collecting R&D, manufacturing data ➢ Disturbing production line ➢ Indirect ➢ Cheap robot for DDoS ➢ Easy entry point
  • 3. 3/21 Understanding the risks Developer Fix all possible weaknesses Deactivate possible users errors LTS assumed for free Back Hat Only need one security hole Can be help by careless users Good long term business opportunities Good international network
  • 4. 4/21 Security fundamentals Minimise surface of attack Control the code which is run Provide a bullet proof update model Track security patches Use HW security helpers when available Limit lateral movement in the system Develop and QA with security turned on Do not rely on human but on platform and tools Security cannot be added after the fact
  • 5. Do not rely on human ➢ Security experts are out of reach ➢ 9M Mobile Developers ➢ 8M Web Developers ➢ 0.5M Embedded Developers ➢ How many Embedded Security Developers ? ➢ Human are unreliable ➢ We do not have the time now ➢ Oups, it’s too late to change it ➢ No one is interested by our system ➢ We are too small ➢ ...
  • 6. 6/21 Concepts are Known but what about implementation? EPID ID Management EPID ID Management TPM Private/Secure Store TPM Private/Secure Store UEFI Secured Boot UEFI Secured Boot Linux Kernel with up-to-date patchesLinux Kernel with up-to-date patches SoC Specific drivers Harden OS servicesHarden OS services Mandatory Access Control Integrity Name Space Firewall Safe update Encryption ID/Key protection APIAPI Untrusted Apps / MiddlewareUntrusted Apps / Middleware Full isolation Signing Repo create Debug Customize SoC Drivers Signing Repo create Debug Customize SoC Drivers Default policies Debug Sample code HowTo Default policies Debug Sample code HowTo AppFW App Debug App Packaging AppFW App Debug App Packaging Tools-DocTools-Doc Software running onTargetSoftware running onTarget
  • 7. 7/21 Know who/what you trust ➢ Trusted Boot : a MUST Have Feature ➢ Leverage hardware capabilities ➢ Small series & developer key handling ➢ Application Installation ➢ Verify integrity ➢ Verify origin ➢ Request User Consent [privacy & permissions] ➢ Update ➢ Only signed updates with a trusted origin ➢ Secured updates on compromised devices are a no-go option ➢ Factory reset built-in from a trusted zone ➢ Do not let back doors opened via containers ➢ Strict control of custom drivers [in kernel mode everything is possible]
  • 8. 8/21 Layered Architecture ➢ Client/UI (untrusted) ➢ Risk of code injection (HTML5/QML) ➢ UI on external devices (Mobiles, Tablets) ➢ Access to secure service APIs [REST/WS] ➢ Applications & Services (semi-trusted) ➢ Unknown developers & Multi-source ➢ High-grain protection by Linux DAC & MAC labels. ➢ Run under control of Application Framework: need to provide a security manifest ➢ Platform & System services (trusted) ➢ Message Services started by systemd ➢ Service and API fine grain privilege protection ➢ Part of baseline distribution and certified services only
  • 9. 9/21 Bullet proof update and ID Update is the only possible correction l Must run safely on compromised devices l Cannot assume a know starting point Compromised ID / keys has no return l Per device unique ID l Per device symmetric keys l Use HW ID protection (e.g. EPID) Non reproducibility l Breaking in one device cannot be extended l Development I/O are disabled l Root password is unique (or better a key) l Password cannot be easily recalculated
  • 10. 10/21 A practical example (AGL) Applicable to any Industrial IoT Linux
  • 11. 11/21 Service isolation Run services with UID<>0 SystemD is your friend l Create dedicated UID per service l Use Linux MAC and Smack DAC to minimise open Access Drop privileges l Posix privileges l MAC privileges C-goups l Reduce offending power l RAM/CPU/IO Name Space l Limit access to private data l Limit access to connectivity https://www.kernel.org/doc/Documentation/cgroups/cgroups.txt https://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/capfaq-0.2.txt http://man7.org/linux/man-pages/man7/namespaces.7.html https://en.wikipedia.org/wiki/Mandatory_access_control https://en.wikipedia.org/wiki/Discretionary_access_control
  • 12. 12/21 Segregate Apps from OS ➢ Application Manager ➢ One system daemon for application live cycle installs, update, delete ➢ One user daemon per user for application start, stop, pause, resume ➢ Create initial share secret between UI and Binder ➢ Spawn and controls application processes: binder, UI, … ➢ Security Manager ➢ Responsible of privilege enforcement ➢ Based on Cynara + WebSocket and D-Bus for Legacy) ➢ Application & Services Binders ➢ Expose platform APIs to UI, Services, Applications ➢ Loads services/application plugins :Audio, Canbus, Media Server… ➢ One private binder per application/services [REST, WebSocket, Dbus] ➢ Authenticate UI by oAuth token type ➢ Secured by SMACK label + UID/GIDs ➢ AppBinders runs under user $HOME
  • 13. 13/21 AGL2 Application Security Agent-2 Car Environement Agent-3 Engine Agent-4 Remote Signal CAN Bus-A LIN Bus-A Audio CAN Bus-B Cluster-Unit ... Smart City RVI Cloud Transport + Acess Control Navigation Service Carte handling POI management etc... Log/Supervision Service Carte handling POI management etc... MultiMedia Service Media Player Radio Interface etc... Distributed Application Architecture MAC Enforcement Smack Cgroups NameSpace Containers Application Framwork Live Cycle Management Start,Stop,Pause,Install,Remove,...
  • 15. 15/21 To write an App ➢ Write back-end binding ➢ Adds the specialised API to the system ➢ Accessible by Web Socket or slow legacy D-Bus ➢ Run in its own security domain ➢ Can be cascaded ➢ Write the Front end ➢ Typically in HTML5, QML but open to any ➢ Connect to back-end binding using REST with secured key (OAuth2) ➢ ➢ Package ➢ Based on W3C widget ➢ Feature allow to handle AGL specificities ➢ Install via the AppFW
  • 16. 16/21 AGL2+ Distributed Architecture Cluster Carte handling Localistion management POI CAN GPS Geopositioning Virtual Signal Multi ECU & Cloud Aware Architecture Entertainement CAN-BUS Virtual Signal Gyro, AcelerometerCAN-BUS LIN-BUS Engine-CAN-BUS ABS Transport & ACL Head Unix Direction Indication Cloud Log Analytics No-SQL Engine Statistics & Analytics Transport & ACL My Car Portal Paiement Subcriptions Preference Preferences & Custumisation MongoDB Engine Paiement Service Cluster Virtual Signal Transport & ACL Navigation Service Maintenance Portal Know Bugs Maintenances Service Packs
  • 17. 17/21 AGL2++ Virtualised Architecture Hardware Trusted Zone Hypervisor MorePrivilegesLessPrivileges AGL Linux Kernel Guest Operating Linux-RT/Microkernel Guest Operating AGL Core Plateform Services AGL Extra Middleware AGLApp-1 AGLApp-2 AGLApp-3 DomU Entertainment App-1 App-2 AGL Mini Plateform Services DomU Cluster Trusted Apps AGL Linux Supervisor PKIsafeStore Integretycontrol Ressources Alloc/Porxy Emergency Services Trusted Boot DOM0 controller Virt GPU Virt Audio Virt GPU Virt Audio Diagnistics Virtualized Secure Architecture Container
  • 18. 18/21 Conclusion ➢ Technologies are available ➢ Secure boot, Secure zone ➢ Update over the air ➢ Isolation and containment ➢ Tools and training ➢ Management is not ready ➢ Still perceived as a nice to have ➢ Too risky to commit ➢ Engineering sees security as a brake to innovation ➢ Requires a serious personal investment and paradigm shift ➢ Complexity imposes to select a “Ready Made” solution ➢ AGL, Tizen, Snappy, ... ➢ “Will add it later” attitude is common but a guaranteed model to failure
  • 19. Questions LibreCon 2016, Bilbao, Es dominig.arfoll@fridu.net Golfe Morbihan, South Brittany
  • 20. 20/21 Container "A mixed blessing" Easy to use l Detach the App from the platform l Integrated App management l Well known Not very secure l Unreliable introspection l MAC has no power on the inside of a container l Updating the platform does not update the l middleware l Beside the Kernel each App provide its own version l of the OS l Each App restart requires a full passing of credential l RAM and Flash footprint are uncontrollable l Far more secured with Clear Container but not applicable to low end SoC. Only I/O via network l Well equipped for Rest API l All other I/O requires driver level access or bespoke framework. https://www.opencontainers.org/ https://lwn.net/Articles/644675/
  • 21. 21/21 Security Check list Control which code you run l Secure boot l Integrity l Secure update Isolate services l Drop root when possible l Drop privileges Isolate Apps l Apps are not the OS l Enforce – restrict access to standard API Identity l Enforce identity unicity l Use available HW protection Encryption l Network traffic l Local storage Control image creation l No debug tool in production l No default root password l No unrequired open port Continuous integration l Automate static analysis l QA on secured image Help developer l Integrate security in Devel image l Provide clear guide line l Isolate Apps from OS l Focus on standardised Middleware