SlideShare a Scribd company logo
© 2021 Arm Limited
1
Vision in IoT, why It’s a
Security Minefield and
How to Navigate It
Dr. Lyndon Fawcett
Principal Software Security Architect
Arm
© 2021 Arm Limited
2
Company
Armv9 SeeWare
About this talk
© 2021 Arm Limited
4
Intended audience & Objectives
Audience:
• Business decision makers
(for vision in IoT)
Objectives
• Threat landscape of deploying vision in IoT
• The state of the art in guidance around
security
• Recommendations for hardening
What this talk is not:
• A replacement for dedicated security
professionals
• Holistic capture of security for your
business
Vision in IoT
© 2021 Arm Limited
6 © 2021 Arm Limited
6
Vision in critical systems:
• Autonomous cars
• Smart streets
• CCTV
• Water levels
• Industry 4.0
• Autonomous
delivery
• Smart Homes
Embedded vision use cases
PSA 2021 Certified Report
Critical systems
Sensitive data
93% See security
as a key
differentiator
Threat Landscape
© 2021 Arm Limited
8
Cloud to edge deployment continuum
Threat modeling
• Actors
• Context
• Heterogeneity
© 2021 Arm Limited
9
• Adversarial attacks in computer vision
• Sign manipulation example
• Lane manipulation example
• Typographic attacks
• https://openai.com/blog/multimodal-neurons/
• Knowledge distillation attacks
• https://arxiv.org/pdf/1906.06046.pdf
• Loss of IP
Vision/ML specific threats
Granny Smith 85.6%
iPod 0.4%
library 0.0%
pizza 0.0%
toaster 0.0%
dough 0.1%
Granny Smith 00.1%
iPod 99.7%
library 0.0%
pizza 0.0%
toaster 0.0%
dough 0.0%
© 2021 Arm Limited
10
IoT threats
• Webcam/CCTV incidents
• Smart home cameras with weak
passwords
• CCTV breach
• General IoT incidents (still applicable to vision)
• Malicious control of car driver aids
• Mirai Botnet
• https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-
of-150-000-security-cams
• https://www.bbc.co.uk/news/technology-33650491
• https://en.wikipedia.org/wiki/Mirai_(malware)
• https://www.iotsecurityfoundation.org/iot-botnets-might-be-the-cybersecurity-industrys-
next-big-worry/
© 2021 Arm Limited
10
Navigating the minefield
© 2021 Arm Limited
12
Navigating the minefield: Overview
Analyse
• Partnership
Model
• Setting up for
success
Design
• Zero trust
• Protecting
in the wild
Maintain
• Operations
• Monitoring
© 2021 Arm Limited
13
Analyse: Partner model to IoT
ML
experts
Cloud and
Data
Telco
Factory
Integrator
Customer
End
customer
Producing end solutions in Vision
& IoT is difficult!
How many components do you
do in this circle?
How many components do you
directly rely on?
© 2021 Arm Limited
14
Analyse: setting up for success
• Perform risk analysis & threat modelling for all parts of your remit
• Understand what frameworks and standards you need to follow
• NIST Cyber Security Framework
• IoT Security Framework
• Validate your partners stance and implementation of security
• Field specific standards and guidelines
• Road vehicles -- Cyber security (ISO/SAE FDIS 21434)
• IoT Security and Privacy (ISO/IEC CD 27400.3)
• Pen-tests
• Selling security
• Calculating your ROI
© 2021 Arm Limited
15
Design: Zero-Trust Security
• Follow and implement a Zero-Trust approach to security
Zero-Trust
Authentication
& Identity
End2End
Encryption
Observability &
Monitoring
Perimeter
security
Data driven
protection
Perimeter Security
Zero-Trust Security
© 2021 Arm Limited
16
Design: Protecting IoT in the wild
Implementing security
at the hardware layer
• Not using dev boards in
production!
• RoT, Encrypted Storage,
Secure Boot
• Tamper proofing
• Fuses
• Device hardening
• Removing access
• Minimizing risk
potential
• Limiting data
• Limiting function
© 2021 Arm Limited
17
Maintain
• Getting certified for your field
• Operational security
• Login detection, endpoint protection
• Using Multi-factor authentication (MFA)
• Pen-testing
• Fast Zero Day remediation
© 2021 Arm Limited
18
Summary & Questions
• Vision in IoT and the threat landscape
• Vision use cases and critical systems
• Adversarial attacks
• IoT threats
• Navigating the minefield
• Understanding the partnership
model
• Scoping your security
• Standards and best practices
Parts not included
Appendix
© 2021 Arm Limited
20
Warning: Parts not included!
SECURITY
DEVELOPMENT
LIFECYCLE (SDL)
INFLUENCING YOUR
TEAM THAT SECURITY
IS IMPORTANT
DEFENSE IN DEPTH
RELEASE
CHECKPOINTS
AND MORE….
Frameworks
&
Specifications
Threat Management
Tooling & Automation
E2E Security Process
Operational Security
© 2021 Arm Limited
21
Still interested? Further reading:
Related content reading
• https://seechange.ai/privacy-and-
security/
• https://seechange.ai/from-cloud-to-
iot-securing-the-continuum/
2
General security reading
• https://www.cisco.com/c/en/us/solut
ions/collateral/executive-
perspectives/annual-internet-
report/white-paper-c11-741490.pdf
• https://www.cisco.com/c/dam/en/us
/products/collateral/security/2020-
outcomes-study-main-report.pdf
• https://www.nist.gov/programs-
projects/nist-cybersecurity-iot-
program

More Related Content

What's hot

Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
Sabidur Rahman
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
John Soldatos
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
Haidee McMahon
 
Enabling the IoT in the Cloud
Enabling the IoT in the Cloud Enabling the IoT in the Cloud
Enabling the IoT in the Cloud
Telefónica IoT
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
Chetan Kumar S
 
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
DevOps.com
 
IoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxIoT Platform Meetup - Sigfox
IoT Platform Meetup - Sigfox
Filip Kolář
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
M2M Alliance e.V.
 
IoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonIoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathon
Cisco DevNet
 
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AGIoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
Jesse van Doren
 
Track 2 session 8 - st dev con 2016 - lora(senet)
Track 2   session 8 - st dev con 2016 - lora(senet)Track 2   session 8 - st dev con 2016 - lora(senet)
Track 2 session 8 - st dev con 2016 - lora(senet)
ST_World
 
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
LiveAction Next Generation Network Management Software
 
5G Enablers and Use Cases, an European Pespective
5G Enablers and Use Cases, an European Pespective5G Enablers and Use Cases, an European Pespective
5G Enablers and Use Cases, an European Pespective
Vietnam Open Infrastructure User Group
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantage
Thibault Cantegrel
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
cem lale
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
Paul O'Hagan
 
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICONOSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
jochen.hiller
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
Cisco Canada
 
Major Market Shifts in IT
Major Market Shifts in ITMajor Market Shifts in IT
Major Market Shifts in IT
inside-BigData.com
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
Cisco DevNet
 

What's hot (20)

Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
Enabling the IoT in the Cloud
Enabling the IoT in the Cloud Enabling the IoT in the Cloud
Enabling the IoT in the Cloud
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
 
IoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxIoT Platform Meetup - Sigfox
IoT Platform Meetup - Sigfox
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
IoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathonIoX - tech-intro-for-paris-hackathon
IoX - tech-intro-for-paris-hackathon
 
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AGIoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
 
Track 2 session 8 - st dev con 2016 - lora(senet)
Track 2   session 8 - st dev con 2016 - lora(senet)Track 2   session 8 - st dev con 2016 - lora(senet)
Track 2 session 8 - st dev con 2016 - lora(senet)
 
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
 
5G Enablers and Use Cases, an European Pespective
5G Enablers and Use Cases, an European Pespective5G Enablers and Use Cases, an European Pespective
5G Enablers and Use Cases, an European Pespective
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantage
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICONOSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
Major Market Shifts in IT
Major Market Shifts in ITMajor Market Shifts in IT
Major Market Shifts in IT
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 

Similar to “IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Presentation from Arm

Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Ulrich Seldeslachts
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
SolarWinds
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
Abasse KPEGOUNI
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
Dell EMC World
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
Syam Madanapalli
 
Protecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCProtecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaC
Fernando Cardoso
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
3G4G
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Denim Group
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
Onward Security
 
Cyber security course in Kerala , Kochi
Cyber security course in Kerala ,  KochiCyber security course in Kerala ,  Kochi
Cyber security course in Kerala , Kochi
amallblitz0
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
lior mazor
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance
 
Addressing Cloud Security with OPA
Addressing Cloud Security with OPAAddressing Cloud Security with OPA
Addressing Cloud Security with OPA
DiemShin
 
“Software-Defined Cameras for Edge Computing of the Future,” a Presentation f...
“Software-Defined Cameras for Edge Computing of the Future,” a Presentation f...“Software-Defined Cameras for Edge Computing of the Future,” a Presentation f...
“Software-Defined Cameras for Edge Computing of the Future,” a Presentation f...
Edge AI and Vision Alliance
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
AldoPalominoBravo
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
Laird Connectivity
 

Similar to “IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Presentation from Arm (20)

Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
Protecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaCProtecting Pipeline DevOps and IaC
Protecting Pipeline DevOps and IaC
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Cyber security course in Kerala , Kochi
Cyber security course in Kerala ,  KochiCyber security course in Kerala ,  Kochi
Cyber security course in Kerala , Kochi
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Addressing Cloud Security with OPA
Addressing Cloud Security with OPAAddressing Cloud Security with OPA
Addressing Cloud Security with OPA
 
“Software-Defined Cameras for Edge Computing of the Future,” a Presentation f...
“Software-Defined Cameras for Edge Computing of the Future,” a Presentation f...“Software-Defined Cameras for Edge Computing of the Future,” a Presentation f...
“Software-Defined Cameras for Edge Computing of the Future,” a Presentation f...
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
 

More from Edge AI and Vision Alliance

“Squeezing the Last Milliwatt and Cubic Millimeter from Smart Cameras Using t...
“Squeezing the Last Milliwatt and Cubic Millimeter from Smart Cameras Using t...“Squeezing the Last Milliwatt and Cubic Millimeter from Smart Cameras Using t...
“Squeezing the Last Milliwatt and Cubic Millimeter from Smart Cameras Using t...
Edge AI and Vision Alliance
 
"Maximize Your AI Compatibility with Flexible Pre- and Post-processing," a Pr...
"Maximize Your AI Compatibility with Flexible Pre- and Post-processing," a Pr..."Maximize Your AI Compatibility with Flexible Pre- and Post-processing," a Pr...
"Maximize Your AI Compatibility with Flexible Pre- and Post-processing," a Pr...
Edge AI and Vision Alliance
 
“Addressing Tomorrow’s Sensor Fusion and Processing Needs with Cadence’s Newe...
“Addressing Tomorrow’s Sensor Fusion and Processing Needs with Cadence’s Newe...“Addressing Tomorrow’s Sensor Fusion and Processing Needs with Cadence’s Newe...
“Addressing Tomorrow’s Sensor Fusion and Processing Needs with Cadence’s Newe...
Edge AI and Vision Alliance
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
“Silicon Slip-ups: The Ten Most Common Errors Processor Suppliers Make (Numbe...
“Silicon Slip-ups: The Ten Most Common Errors Processor Suppliers Make (Numbe...“Silicon Slip-ups: The Ten Most Common Errors Processor Suppliers Make (Numbe...
“Silicon Slip-ups: The Ten Most Common Errors Processor Suppliers Make (Numbe...
Edge AI and Vision Alliance
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
“How Arm’s Machine Learning Solution Enables Vision Transformers at the Edge,...
“How Arm’s Machine Learning Solution Enables Vision Transformers at the Edge,...“How Arm’s Machine Learning Solution Enables Vision Transformers at the Edge,...
“How Arm’s Machine Learning Solution Enables Vision Transformers at the Edge,...
Edge AI and Vision Alliance
 
“Nx EVOS: A New Enterprise Operating System for Video and Visual AI,” a Prese...
“Nx EVOS: A New Enterprise Operating System for Video and Visual AI,” a Prese...“Nx EVOS: A New Enterprise Operating System for Video and Visual AI,” a Prese...
“Nx EVOS: A New Enterprise Operating System for Video and Visual AI,” a Prese...
Edge AI and Vision Alliance
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
"OpenCV for High-performance, Low-power Vision Applications on Snapdragon," a...
"OpenCV for High-performance, Low-power Vision Applications on Snapdragon," a..."OpenCV for High-performance, Low-power Vision Applications on Snapdragon," a...
"OpenCV for High-performance, Low-power Vision Applications on Snapdragon," a...
Edge AI and Vision Alliance
 
“Deploying Large Models on the Edge: Success Stories and Challenges,” a Prese...
“Deploying Large Models on the Edge: Success Stories and Challenges,” a Prese...“Deploying Large Models on the Edge: Success Stories and Challenges,” a Prese...
“Deploying Large Models on the Edge: Success Stories and Challenges,” a Prese...
Edge AI and Vision Alliance
 
“Scaling Vision-based Edge AI Solutions: From Prototype to Global Deployment,...
“Scaling Vision-based Edge AI Solutions: From Prototype to Global Deployment,...“Scaling Vision-based Edge AI Solutions: From Prototype to Global Deployment,...
“Scaling Vision-based Edge AI Solutions: From Prototype to Global Deployment,...
Edge AI and Vision Alliance
 
“What’s Next in On-device Generative AI,” a Presentation from Qualcomm
“What’s Next in On-device Generative AI,” a Presentation from Qualcomm“What’s Next in On-device Generative AI,” a Presentation from Qualcomm
“What’s Next in On-device Generative AI,” a Presentation from Qualcomm
Edge AI and Vision Alliance
 
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
Edge AI and Vision Alliance
 
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
Edge AI and Vision Alliance
 
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
Edge AI and Vision Alliance
 
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
Edge AI and Vision Alliance
 
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
Edge AI and Vision Alliance
 
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
Edge AI and Vision Alliance
 
“Vision-language Representations for Robotics,” a Presentation from the Unive...
“Vision-language Representations for Robotics,” a Presentation from the Unive...“Vision-language Representations for Robotics,” a Presentation from the Unive...
“Vision-language Representations for Robotics,” a Presentation from the Unive...
Edge AI and Vision Alliance
 

More from Edge AI and Vision Alliance (20)

“Squeezing the Last Milliwatt and Cubic Millimeter from Smart Cameras Using t...
“Squeezing the Last Milliwatt and Cubic Millimeter from Smart Cameras Using t...“Squeezing the Last Milliwatt and Cubic Millimeter from Smart Cameras Using t...
“Squeezing the Last Milliwatt and Cubic Millimeter from Smart Cameras Using t...
 
"Maximize Your AI Compatibility with Flexible Pre- and Post-processing," a Pr...
"Maximize Your AI Compatibility with Flexible Pre- and Post-processing," a Pr..."Maximize Your AI Compatibility with Flexible Pre- and Post-processing," a Pr...
"Maximize Your AI Compatibility with Flexible Pre- and Post-processing," a Pr...
 
“Addressing Tomorrow’s Sensor Fusion and Processing Needs with Cadence’s Newe...
“Addressing Tomorrow’s Sensor Fusion and Processing Needs with Cadence’s Newe...“Addressing Tomorrow’s Sensor Fusion and Processing Needs with Cadence’s Newe...
“Addressing Tomorrow’s Sensor Fusion and Processing Needs with Cadence’s Newe...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
“Silicon Slip-ups: The Ten Most Common Errors Processor Suppliers Make (Numbe...
“Silicon Slip-ups: The Ten Most Common Errors Processor Suppliers Make (Numbe...“Silicon Slip-ups: The Ten Most Common Errors Processor Suppliers Make (Numbe...
“Silicon Slip-ups: The Ten Most Common Errors Processor Suppliers Make (Numbe...
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
“How Arm’s Machine Learning Solution Enables Vision Transformers at the Edge,...
“How Arm’s Machine Learning Solution Enables Vision Transformers at the Edge,...“How Arm’s Machine Learning Solution Enables Vision Transformers at the Edge,...
“How Arm’s Machine Learning Solution Enables Vision Transformers at the Edge,...
 
“Nx EVOS: A New Enterprise Operating System for Video and Visual AI,” a Prese...
“Nx EVOS: A New Enterprise Operating System for Video and Visual AI,” a Prese...“Nx EVOS: A New Enterprise Operating System for Video and Visual AI,” a Prese...
“Nx EVOS: A New Enterprise Operating System for Video and Visual AI,” a Prese...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
"OpenCV for High-performance, Low-power Vision Applications on Snapdragon," a...
"OpenCV for High-performance, Low-power Vision Applications on Snapdragon," a..."OpenCV for High-performance, Low-power Vision Applications on Snapdragon," a...
"OpenCV for High-performance, Low-power Vision Applications on Snapdragon," a...
 
“Deploying Large Models on the Edge: Success Stories and Challenges,” a Prese...
“Deploying Large Models on the Edge: Success Stories and Challenges,” a Prese...“Deploying Large Models on the Edge: Success Stories and Challenges,” a Prese...
“Deploying Large Models on the Edge: Success Stories and Challenges,” a Prese...
 
“Scaling Vision-based Edge AI Solutions: From Prototype to Global Deployment,...
“Scaling Vision-based Edge AI Solutions: From Prototype to Global Deployment,...“Scaling Vision-based Edge AI Solutions: From Prototype to Global Deployment,...
“Scaling Vision-based Edge AI Solutions: From Prototype to Global Deployment,...
 
“What’s Next in On-device Generative AI,” a Presentation from Qualcomm
“What’s Next in On-device Generative AI,” a Presentation from Qualcomm“What’s Next in On-device Generative AI,” a Presentation from Qualcomm
“What’s Next in On-device Generative AI,” a Presentation from Qualcomm
 
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
“Learning Compact DNN Models for Embedded Vision,” a Presentation from the Un...
 
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
“Introduction to Computer Vision with CNNs,” a Presentation from Mohammad Hag...
 
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
“Selecting Tools for Developing, Monitoring and Maintaining ML Models,” a Pre...
 
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
“Building Accelerated GStreamer Applications for Video and Audio AI,” a Prese...
 
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
“Understanding, Selecting and Optimizing Object Detectors for Edge Applicatio...
 
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
“Introduction to Modern LiDAR for Machine Perception,” a Presentation from th...
 
“Vision-language Representations for Robotics,” a Presentation from the Unive...
“Vision-language Representations for Robotics,” a Presentation from the Unive...“Vision-language Representations for Robotics,” a Presentation from the Unive...
“Vision-language Representations for Robotics,” a Presentation from the Unive...
 

Recently uploaded

"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 

Recently uploaded (20)

"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 

“IoT and Vision: Why It’s a Security Minefield and How to Navigate It,” a Presentation from Arm

  • 1. © 2021 Arm Limited 1 Vision in IoT, why It’s a Security Minefield and How to Navigate It Dr. Lyndon Fawcett Principal Software Security Architect Arm
  • 2. © 2021 Arm Limited 2 Company Armv9 SeeWare
  • 4. © 2021 Arm Limited 4 Intended audience & Objectives Audience: • Business decision makers (for vision in IoT) Objectives • Threat landscape of deploying vision in IoT • The state of the art in guidance around security • Recommendations for hardening What this talk is not: • A replacement for dedicated security professionals • Holistic capture of security for your business
  • 6. © 2021 Arm Limited 6 © 2021 Arm Limited 6 Vision in critical systems: • Autonomous cars • Smart streets • CCTV • Water levels • Industry 4.0 • Autonomous delivery • Smart Homes Embedded vision use cases PSA 2021 Certified Report Critical systems Sensitive data 93% See security as a key differentiator
  • 8. © 2021 Arm Limited 8 Cloud to edge deployment continuum Threat modeling • Actors • Context • Heterogeneity
  • 9. © 2021 Arm Limited 9 • Adversarial attacks in computer vision • Sign manipulation example • Lane manipulation example • Typographic attacks • https://openai.com/blog/multimodal-neurons/ • Knowledge distillation attacks • https://arxiv.org/pdf/1906.06046.pdf • Loss of IP Vision/ML specific threats Granny Smith 85.6% iPod 0.4% library 0.0% pizza 0.0% toaster 0.0% dough 0.1% Granny Smith 00.1% iPod 99.7% library 0.0% pizza 0.0% toaster 0.0% dough 0.0%
  • 10. © 2021 Arm Limited 10 IoT threats • Webcam/CCTV incidents • Smart home cameras with weak passwords • CCTV breach • General IoT incidents (still applicable to vision) • Malicious control of car driver aids • Mirai Botnet • https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach- of-150-000-security-cams • https://www.bbc.co.uk/news/technology-33650491 • https://en.wikipedia.org/wiki/Mirai_(malware) • https://www.iotsecurityfoundation.org/iot-botnets-might-be-the-cybersecurity-industrys- next-big-worry/ © 2021 Arm Limited 10
  • 12. © 2021 Arm Limited 12 Navigating the minefield: Overview Analyse • Partnership Model • Setting up for success Design • Zero trust • Protecting in the wild Maintain • Operations • Monitoring
  • 13. © 2021 Arm Limited 13 Analyse: Partner model to IoT ML experts Cloud and Data Telco Factory Integrator Customer End customer Producing end solutions in Vision & IoT is difficult! How many components do you do in this circle? How many components do you directly rely on?
  • 14. © 2021 Arm Limited 14 Analyse: setting up for success • Perform risk analysis & threat modelling for all parts of your remit • Understand what frameworks and standards you need to follow • NIST Cyber Security Framework • IoT Security Framework • Validate your partners stance and implementation of security • Field specific standards and guidelines • Road vehicles -- Cyber security (ISO/SAE FDIS 21434) • IoT Security and Privacy (ISO/IEC CD 27400.3) • Pen-tests • Selling security • Calculating your ROI
  • 15. © 2021 Arm Limited 15 Design: Zero-Trust Security • Follow and implement a Zero-Trust approach to security Zero-Trust Authentication & Identity End2End Encryption Observability & Monitoring Perimeter security Data driven protection Perimeter Security Zero-Trust Security
  • 16. © 2021 Arm Limited 16 Design: Protecting IoT in the wild Implementing security at the hardware layer • Not using dev boards in production! • RoT, Encrypted Storage, Secure Boot • Tamper proofing • Fuses • Device hardening • Removing access • Minimizing risk potential • Limiting data • Limiting function
  • 17. © 2021 Arm Limited 17 Maintain • Getting certified for your field • Operational security • Login detection, endpoint protection • Using Multi-factor authentication (MFA) • Pen-testing • Fast Zero Day remediation
  • 18. © 2021 Arm Limited 18 Summary & Questions • Vision in IoT and the threat landscape • Vision use cases and critical systems • Adversarial attacks • IoT threats • Navigating the minefield • Understanding the partnership model • Scoping your security • Standards and best practices Parts not included
  • 20. © 2021 Arm Limited 20 Warning: Parts not included! SECURITY DEVELOPMENT LIFECYCLE (SDL) INFLUENCING YOUR TEAM THAT SECURITY IS IMPORTANT DEFENSE IN DEPTH RELEASE CHECKPOINTS AND MORE…. Frameworks & Specifications Threat Management Tooling & Automation E2E Security Process Operational Security
  • 21. © 2021 Arm Limited 21 Still interested? Further reading: Related content reading • https://seechange.ai/privacy-and- security/ • https://seechange.ai/from-cloud-to- iot-securing-the-continuum/ 2 General security reading • https://www.cisco.com/c/en/us/solut ions/collateral/executive- perspectives/annual-internet- report/white-paper-c11-741490.pdf • https://www.cisco.com/c/dam/en/us /products/collateral/security/2020- outcomes-study-main-report.pdf • https://www.nist.gov/programs- projects/nist-cybersecurity-iot- program