SlideShare a Scribd company logo
1 of 17
Marcelo Pasin
Univerity of Neuchâtel,
Switzerand
Security and Robustness for
VEDLIoT Components
from Cloud through Edge
26 September 2023
Alysson Bessani, Simon Bouget, José Cecílio,
Pascal Felber, Erik Funke, Carina Marcus, Jämes
Ménétrey, Shahid Raza, Valerio Schiavoni, Piotr
Zierhoffer
2
Context
3
Context
4
▪ How to improve security and robustness?
▪ We work in the context of machine learning applications
▪ Take into account the continuum: IoT, edge and cloud computing
▪ Security
▪ Provide means for security at all levels, mostly as system functions
▪ Base our solutions on trusted execution environments (TEEs)
▪ Offer, as much as possible, homogeneity through the continuum
▪ Robustness
▪ Robustness problems are context-specific (app specific)
▪ Need to investigate solutions for ML and IoT
▪ Need to consider requirements from use cases
Improving security and robustness
 Wasm enclaves
 Attestation
 Communication
 Hardware simulation
 Fixing errors
in road safety
 Techniques for
adversarial ML
5
▪ Continuum: needs closing the gaps between cloud, edge, and devices
▪ Today’s continuum is dominated by incompatible silos
▪ Need for a seamless environment across all hardware devices and software stacks
▪ Keep good performance, offer high levels of security
▪ Trusted execution environments
▪ Recent evolution by leading CPU manufacturers
▪ Growing trend to execute software within untrusted environments
▪ WebAssembly (Wasm, originally for web page apps)
▪ Portable binary-code for executable programs + system software interfaces
▪ Most popular languages already have some compiler support
▪ WebAssembly + TEE + set of services and support libraries
 Homogeneity greatly helps closing the gaps in the continuum
 Built-in security allows building robust apps that run averywhere
WASM enclaves
6
▪ TWINE: an execution environment suited for WebAssembly applications inside TEEs
▪ Implemented using Intel SGX
▪ Two main blocks
▪ WebAssembly runtime
▪ Adapted WAMR running inside TEE
▪ WASI interface
▪ Bridge between TEE and untrusted env
▪ WATZ: Wasm in Arm TrustZone
▪ Also implements lightweight attestation (IETF RATS) for Wasm apps
Attestation Mechanisms for Trusted Execution Environments Demystified, DAIS 2022
WebAssembly as a Common Layer for the Cloud-edge Continuum, FRAME 2022.
WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone, ICDCS 2022.
Twine: An Embedded Trusted Runtime for WebAssembly, ICDE 2021.
WebAssembly runtime
7
▪ Remote attestation certification for IoT assurance
▪ Remote attestation verifies the authenticity and integrity of software
▪ Resulting certificate form the basis of mutual trust
▪ Time-of-Check vs Time-of-Use Attacks (TOCTOU)
▪ No temporal guarantees: software compromised after certification, but before use
▪ Solution: attestation is done at time of use, with continuous audit mechanisms
▪ TruCerT approach: to combine IoT assurance with PKI digital certificate
(Authentication-Assurance Certificate)
▪ IETF RATS leveraging secure hardware (TPM 2.0)
▪ Standardized way for distributing certificates (X509 + extensions)
AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance, Comp & Sec 2023.
ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack, TDSC 2023.
Remote attestation
8
▪ SIRE: Byzantine fault-tolerant service for IoT
▪ No central point of failure
▪ Based on scalable SmartBFT (high perf)
▪ Services implemented
▪ Remote attestation
▪ Membership management
▪ Coordination primitives
▪ Auditable integrity-protected storage
On the Minimal Knowledge Required for Solving Stellar Consensus, ICDCS 2023.
COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services, IEEE SP 2022.
Security in the attestation process
9
▪ Pub/sub ➙ effective comm mechanism for the continuum
▪ Scale and distribute communications across heterogeneous architectures
▪ We developed a secure, attested pub/sub system (using TWINE: Wasm + SGX)
▪ Compatible with most of the state-of-the-art (Mosquitto, WolfSSL)
▪ Mutual attestation: extended TLS handshake embeds attestation evidence
Secure, attested, publish-subscribe for IoT and edge
Broker
Producer
Endpoint
TEE
WASM
Broker
logic
Mosquitto
TLS
library
TEE
API
TEE
Subscriber
Endpoint
TEE
Persistence
WASI
TLScer-
tificates
Global CA
Endpoint
IoT Cloud Cloud IoT
10
Hardware Platform for IoT Security
▪ Easy and secure tool
▪ Shields IoT devices from the main network
▪ Uses VPN technology
▪ Encrypts and encapsulates network traffic
Key Features
▪ IoT devices are separated from the company LAN
▪ Encrypted traffic up to 100 Mbit/s per IoT device
▪ WiFi and LoRa support
▪ Cross-network communication
▪ Access restriction and communication control
▪ Web application
for device monitoring and control
Secure IoT gateway
11
▪ Renode - Antmicro’s open-source functional simulator
▪ Extended with new co-simulation functionality
▪ Coupled functional and cycle-accurate simulation
▪ Robust development flow and testability of ML accelerators, especially for FPGA workflows
▪ Custom Function Units integration
▪ Accelerator hardware tightly coupled into the processor pipeline
▪ Custom RISC-V instructions, ML accelerators
▪ Project with Google (https://github.com/google/CFU-Playground/)
▪ Interface with Verilator (converts HDL to a cycle-accurate model in C++)
▪ Direct Programming Interface support
▪ Interfaces HDL with foreign languages
▪ Allows for co-simulation with a range of tools: Verilator, Questa, Vivado, etc.
Robust hardware simulation
12
▪ VEDLIoT automotive use case applies ML models in the context of road safety
▪ Incorporate monitoring and mitigation strategies to manage run-time errors
▪ Examples of error types and their management
▪ External errors
▪ Mitigable: error in vehicle localization ➙ involve redundant sources of position
▪ Non-mitigable: sudden, unexpected harsh weather, outside ODD* for sensors ➙ alert the driver
▪ Internal errors
▪ Mitigable: loss of stored system information ➙ use redundant storage locations
▪ Non-mitigable: timing errors within a system ➙ create a warning
*ODD: Operational Design Domain
Strategies to increase ML models safety
13
▪ ML training often needs high data volumes
▪ Outsourced data from different sources may include (aggregated) malicious data
▪ Data poisoning: malicious data samples intentionally injected in training
▪ Attacker manipulates model's behaviour during inference, cause incorrect decisions
▪ To detect malicious data
▪ Original data is artificially reconstructed
▪ Mapped back to the original input space
▪ Use thresholds as decision boundary
▪ Separate normal input from abnormal ones
Defence against data poisoning attacks
14
▪ Security built bottom-up
▪ WebAssembly enclaves
▪ Attestation (IoT support, decentralised BFT service)
▪ Secure communication and networking
▪ Robustness built top-down
▪ Robust development flow with hardware simulation
▪ Monitoring and mitigation for safe intelligent vehicles
▪ Preventing attacks on adversarial training data
Summary
15
Thank you for your attention.
Marcelo Pasin
Univerity of Neuchâtel,
Switzerand
Security and Robustness for
VEDLIoT Components
from Cloud through Edge
16
EXTRA SLIDES
17
▪ Hardware Components
▪ IoT Bridge – entry point for the VPN
connection. It is placed between the IoT
device and LAN.
▪ Local Gateway – functions as VPN Tunnel
supplier inside the local network. It comes
as a 19″ 1HE rackmount server.
▪ Network Cockpit – The control interface
for the components listed above. It is a
web application, which allows monitoring
and configuration.
With an easy-to-use web application, the Secure IoT
Gateway allows complete control over IoT Bridges
and IoT Gateways – the hardware counterpart that
ensures encrypted and controlled network traffic.
Gateway architecture

More Related Content

Similar to IoT Tech Expo 2023_Marcelo Pasin presentation

BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyHappiest Minds Technologies
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaHamilton Oliveira
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Codit
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueEurotech
 
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Codit
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingChuck Speicher
 
Luigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptxLuigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptxFIWARE
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsMario Drobics
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersIben Rodriguez
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...ADVA
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network Michelle Holley
 
ScaleFocus Security Conference Part 2
ScaleFocus Security Conference Part 2ScaleFocus Security Conference Part 2
ScaleFocus Security Conference Part 2ScaleFocus
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
Military Edge Computing with Vault and Consul
Military Edge Computing with Vault and ConsulMilitary Edge Computing with Vault and Consul
Military Edge Computing with Vault and ConsulMitchell Pronschinske
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Codit
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 

Similar to IoT Tech Expo 2023_Marcelo Pasin presentation (20)

BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
 
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Luigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptxLuigi Roman - CybersecurityPointOfView-LR.pptx
Luigi Roman - CybersecurityPointOfView-LR.pptx
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
ScaleFocus Security Conference Part 2
ScaleFocus Security Conference Part 2ScaleFocus Security Conference Part 2
ScaleFocus Security Conference Part 2
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
Military Edge Computing with Vault and Consul
Military Edge Computing with Vault and ConsulMilitary Edge Computing with Vault and Consul
Military Edge Computing with Vault and Consul
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 

More from VEDLIoT Project

IoT Tech Expo 2023_Micha vor dem Berge presentation
IoT Tech Expo 2023_Micha vor dem Berge presentationIoT Tech Expo 2023_Micha vor dem Berge presentation
IoT Tech Expo 2023_Micha vor dem Berge presentationVEDLIoT Project
 
Computing Frontiers 2023_Pedro Trancoso presentation
Computing Frontiers 2023_Pedro Trancoso presentationComputing Frontiers 2023_Pedro Trancoso presentation
Computing Frontiers 2023_Pedro Trancoso presentationVEDLIoT Project
 
HiPEAC-CSW 2022_Pedro Trancoso presentation
HiPEAC-CSW 2022_Pedro Trancoso presentationHiPEAC-CSW 2022_Pedro Trancoso presentation
HiPEAC-CSW 2022_Pedro Trancoso presentationVEDLIoT Project
 
IoT Week 2022-NGIoT session_Micha vor dem Berge presentation
IoT Week 2022-NGIoT session_Micha vor dem Berge presentationIoT Week 2022-NGIoT session_Micha vor dem Berge presentation
IoT Week 2022-NGIoT session_Micha vor dem Berge presentationVEDLIoT Project
 
Next Generation IoT Architectures_Hans Salomonsson
Next Generation IoT Architectures_Hans SalomonssonNext Generation IoT Architectures_Hans Salomonsson
Next Generation IoT Architectures_Hans SalomonssonVEDLIoT Project
 
CONASENSE 2022_Jens Hagemeyer presentation
CONASENSE 2022_Jens Hagemeyer presentationCONASENSE 2022_Jens Hagemeyer presentation
CONASENSE 2022_Jens Hagemeyer presentationVEDLIoT Project
 
NGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentationNGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentationVEDLIoT Project
 
IoT Tech Expo 2023_Pedro Trancoso presentation
IoT Tech Expo 2023_Pedro Trancoso presentationIoT Tech Expo 2023_Pedro Trancoso presentation
IoT Tech Expo 2023_Pedro Trancoso presentationVEDLIoT Project
 
HiPEAC-CSW 2022_Kevin Mika presentation
HiPEAC-CSW 2022_Kevin Mika presentationHiPEAC-CSW 2022_Kevin Mika presentation
HiPEAC-CSW 2022_Kevin Mika presentationVEDLIoT Project
 
HiPEAC 2022-DL4IoT workshop_René Griessl presentation
HiPEAC 2022-DL4IoT workshop_René Griessl presentationHiPEAC 2022-DL4IoT workshop_René Griessl presentation
HiPEAC 2022-DL4IoT workshop_René Griessl presentationVEDLIoT Project
 
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentation
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentationSS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentation
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentationVEDLIoT Project
 
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentationHiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentationVEDLIoT Project
 
IoT Week 2021_Jens Hagemeyer presentation
IoT Week 2021_Jens Hagemeyer presentationIoT Week 2021_Jens Hagemeyer presentation
IoT Week 2021_Jens Hagemeyer presentationVEDLIoT Project
 
IoT Tech Expo 2023_Hans-Martin Heyn presentation
IoT Tech Expo 2023_Hans-Martin Heyn presentationIoT Tech Expo 2023_Hans-Martin Heyn presentation
IoT Tech Expo 2023_Hans-Martin Heyn presentationVEDLIoT Project
 
HiPEAC 2022_Marco Tassemeier presentation
HiPEAC 2022_Marco Tassemeier presentationHiPEAC 2022_Marco Tassemeier presentation
HiPEAC 2022_Marco Tassemeier presentationVEDLIoT Project
 
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationHiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationVEDLIoT Project
 
HiPEAC2022_António Casimiro presentation
HiPEAC2022_António Casimiro presentationHiPEAC2022_António Casimiro presentation
HiPEAC2022_António Casimiro presentationVEDLIoT Project
 
NGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentation
NGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentationNGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentation
NGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentationVEDLIoT Project
 
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...VEDLIoT Project
 
NGIoT Sustainability Workshop 2023_Rene Griessl presentation
NGIoT Sustainability Workshop 2023_Rene Griessl presentationNGIoT Sustainability Workshop 2023_Rene Griessl presentation
NGIoT Sustainability Workshop 2023_Rene Griessl presentationVEDLIoT Project
 

More from VEDLIoT Project (20)

IoT Tech Expo 2023_Micha vor dem Berge presentation
IoT Tech Expo 2023_Micha vor dem Berge presentationIoT Tech Expo 2023_Micha vor dem Berge presentation
IoT Tech Expo 2023_Micha vor dem Berge presentation
 
Computing Frontiers 2023_Pedro Trancoso presentation
Computing Frontiers 2023_Pedro Trancoso presentationComputing Frontiers 2023_Pedro Trancoso presentation
Computing Frontiers 2023_Pedro Trancoso presentation
 
HiPEAC-CSW 2022_Pedro Trancoso presentation
HiPEAC-CSW 2022_Pedro Trancoso presentationHiPEAC-CSW 2022_Pedro Trancoso presentation
HiPEAC-CSW 2022_Pedro Trancoso presentation
 
IoT Week 2022-NGIoT session_Micha vor dem Berge presentation
IoT Week 2022-NGIoT session_Micha vor dem Berge presentationIoT Week 2022-NGIoT session_Micha vor dem Berge presentation
IoT Week 2022-NGIoT session_Micha vor dem Berge presentation
 
Next Generation IoT Architectures_Hans Salomonsson
Next Generation IoT Architectures_Hans SalomonssonNext Generation IoT Architectures_Hans Salomonsson
Next Generation IoT Architectures_Hans Salomonsson
 
CONASENSE 2022_Jens Hagemeyer presentation
CONASENSE 2022_Jens Hagemeyer presentationCONASENSE 2022_Jens Hagemeyer presentation
CONASENSE 2022_Jens Hagemeyer presentation
 
NGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentationNGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentation
 
IoT Tech Expo 2023_Pedro Trancoso presentation
IoT Tech Expo 2023_Pedro Trancoso presentationIoT Tech Expo 2023_Pedro Trancoso presentation
IoT Tech Expo 2023_Pedro Trancoso presentation
 
HiPEAC-CSW 2022_Kevin Mika presentation
HiPEAC-CSW 2022_Kevin Mika presentationHiPEAC-CSW 2022_Kevin Mika presentation
HiPEAC-CSW 2022_Kevin Mika presentation
 
HiPEAC 2022-DL4IoT workshop_René Griessl presentation
HiPEAC 2022-DL4IoT workshop_René Griessl presentationHiPEAC 2022-DL4IoT workshop_René Griessl presentation
HiPEAC 2022-DL4IoT workshop_René Griessl presentation
 
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentation
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentationSS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentation
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentation
 
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentationHiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
 
IoT Week 2021_Jens Hagemeyer presentation
IoT Week 2021_Jens Hagemeyer presentationIoT Week 2021_Jens Hagemeyer presentation
IoT Week 2021_Jens Hagemeyer presentation
 
IoT Tech Expo 2023_Hans-Martin Heyn presentation
IoT Tech Expo 2023_Hans-Martin Heyn presentationIoT Tech Expo 2023_Hans-Martin Heyn presentation
IoT Tech Expo 2023_Hans-Martin Heyn presentation
 
HiPEAC 2022_Marco Tassemeier presentation
HiPEAC 2022_Marco Tassemeier presentationHiPEAC 2022_Marco Tassemeier presentation
HiPEAC 2022_Marco Tassemeier presentation
 
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationHiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
 
HiPEAC2022_António Casimiro presentation
HiPEAC2022_António Casimiro presentationHiPEAC2022_António Casimiro presentation
HiPEAC2022_António Casimiro presentation
 
NGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentation
NGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentationNGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentation
NGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentation
 
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...
 
NGIoT Sustainability Workshop 2023_Rene Griessl presentation
NGIoT Sustainability Workshop 2023_Rene Griessl presentationNGIoT Sustainability Workshop 2023_Rene Griessl presentation
NGIoT Sustainability Workshop 2023_Rene Griessl presentation
 

Recently uploaded

Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 

Recently uploaded (20)

Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 

IoT Tech Expo 2023_Marcelo Pasin presentation

  • 1. Marcelo Pasin Univerity of Neuchâtel, Switzerand Security and Robustness for VEDLIoT Components from Cloud through Edge 26 September 2023 Alysson Bessani, Simon Bouget, José Cecílio, Pascal Felber, Erik Funke, Carina Marcus, Jämes Ménétrey, Shahid Raza, Valerio Schiavoni, Piotr Zierhoffer
  • 4. 4 ▪ How to improve security and robustness? ▪ We work in the context of machine learning applications ▪ Take into account the continuum: IoT, edge and cloud computing ▪ Security ▪ Provide means for security at all levels, mostly as system functions ▪ Base our solutions on trusted execution environments (TEEs) ▪ Offer, as much as possible, homogeneity through the continuum ▪ Robustness ▪ Robustness problems are context-specific (app specific) ▪ Need to investigate solutions for ML and IoT ▪ Need to consider requirements from use cases Improving security and robustness  Wasm enclaves  Attestation  Communication  Hardware simulation  Fixing errors in road safety  Techniques for adversarial ML
  • 5. 5 ▪ Continuum: needs closing the gaps between cloud, edge, and devices ▪ Today’s continuum is dominated by incompatible silos ▪ Need for a seamless environment across all hardware devices and software stacks ▪ Keep good performance, offer high levels of security ▪ Trusted execution environments ▪ Recent evolution by leading CPU manufacturers ▪ Growing trend to execute software within untrusted environments ▪ WebAssembly (Wasm, originally for web page apps) ▪ Portable binary-code for executable programs + system software interfaces ▪ Most popular languages already have some compiler support ▪ WebAssembly + TEE + set of services and support libraries  Homogeneity greatly helps closing the gaps in the continuum  Built-in security allows building robust apps that run averywhere WASM enclaves
  • 6. 6 ▪ TWINE: an execution environment suited for WebAssembly applications inside TEEs ▪ Implemented using Intel SGX ▪ Two main blocks ▪ WebAssembly runtime ▪ Adapted WAMR running inside TEE ▪ WASI interface ▪ Bridge between TEE and untrusted env ▪ WATZ: Wasm in Arm TrustZone ▪ Also implements lightweight attestation (IETF RATS) for Wasm apps Attestation Mechanisms for Trusted Execution Environments Demystified, DAIS 2022 WebAssembly as a Common Layer for the Cloud-edge Continuum, FRAME 2022. WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone, ICDCS 2022. Twine: An Embedded Trusted Runtime for WebAssembly, ICDE 2021. WebAssembly runtime
  • 7. 7 ▪ Remote attestation certification for IoT assurance ▪ Remote attestation verifies the authenticity and integrity of software ▪ Resulting certificate form the basis of mutual trust ▪ Time-of-Check vs Time-of-Use Attacks (TOCTOU) ▪ No temporal guarantees: software compromised after certification, but before use ▪ Solution: attestation is done at time of use, with continuous audit mechanisms ▪ TruCerT approach: to combine IoT assurance with PKI digital certificate (Authentication-Assurance Certificate) ▪ IETF RATS leveraging secure hardware (TPM 2.0) ▪ Standardized way for distributing certificates (X509 + extensions) AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance, Comp & Sec 2023. ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack, TDSC 2023. Remote attestation
  • 8. 8 ▪ SIRE: Byzantine fault-tolerant service for IoT ▪ No central point of failure ▪ Based on scalable SmartBFT (high perf) ▪ Services implemented ▪ Remote attestation ▪ Membership management ▪ Coordination primitives ▪ Auditable integrity-protected storage On the Minimal Knowledge Required for Solving Stellar Consensus, ICDCS 2023. COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services, IEEE SP 2022. Security in the attestation process
  • 9. 9 ▪ Pub/sub ➙ effective comm mechanism for the continuum ▪ Scale and distribute communications across heterogeneous architectures ▪ We developed a secure, attested pub/sub system (using TWINE: Wasm + SGX) ▪ Compatible with most of the state-of-the-art (Mosquitto, WolfSSL) ▪ Mutual attestation: extended TLS handshake embeds attestation evidence Secure, attested, publish-subscribe for IoT and edge Broker Producer Endpoint TEE WASM Broker logic Mosquitto TLS library TEE API TEE Subscriber Endpoint TEE Persistence WASI TLScer- tificates Global CA Endpoint IoT Cloud Cloud IoT
  • 10. 10 Hardware Platform for IoT Security ▪ Easy and secure tool ▪ Shields IoT devices from the main network ▪ Uses VPN technology ▪ Encrypts and encapsulates network traffic Key Features ▪ IoT devices are separated from the company LAN ▪ Encrypted traffic up to 100 Mbit/s per IoT device ▪ WiFi and LoRa support ▪ Cross-network communication ▪ Access restriction and communication control ▪ Web application for device monitoring and control Secure IoT gateway
  • 11. 11 ▪ Renode - Antmicro’s open-source functional simulator ▪ Extended with new co-simulation functionality ▪ Coupled functional and cycle-accurate simulation ▪ Robust development flow and testability of ML accelerators, especially for FPGA workflows ▪ Custom Function Units integration ▪ Accelerator hardware tightly coupled into the processor pipeline ▪ Custom RISC-V instructions, ML accelerators ▪ Project with Google (https://github.com/google/CFU-Playground/) ▪ Interface with Verilator (converts HDL to a cycle-accurate model in C++) ▪ Direct Programming Interface support ▪ Interfaces HDL with foreign languages ▪ Allows for co-simulation with a range of tools: Verilator, Questa, Vivado, etc. Robust hardware simulation
  • 12. 12 ▪ VEDLIoT automotive use case applies ML models in the context of road safety ▪ Incorporate monitoring and mitigation strategies to manage run-time errors ▪ Examples of error types and their management ▪ External errors ▪ Mitigable: error in vehicle localization ➙ involve redundant sources of position ▪ Non-mitigable: sudden, unexpected harsh weather, outside ODD* for sensors ➙ alert the driver ▪ Internal errors ▪ Mitigable: loss of stored system information ➙ use redundant storage locations ▪ Non-mitigable: timing errors within a system ➙ create a warning *ODD: Operational Design Domain Strategies to increase ML models safety
  • 13. 13 ▪ ML training often needs high data volumes ▪ Outsourced data from different sources may include (aggregated) malicious data ▪ Data poisoning: malicious data samples intentionally injected in training ▪ Attacker manipulates model's behaviour during inference, cause incorrect decisions ▪ To detect malicious data ▪ Original data is artificially reconstructed ▪ Mapped back to the original input space ▪ Use thresholds as decision boundary ▪ Separate normal input from abnormal ones Defence against data poisoning attacks
  • 14. 14 ▪ Security built bottom-up ▪ WebAssembly enclaves ▪ Attestation (IoT support, decentralised BFT service) ▪ Secure communication and networking ▪ Robustness built top-down ▪ Robust development flow with hardware simulation ▪ Monitoring and mitigation for safe intelligent vehicles ▪ Preventing attacks on adversarial training data Summary
  • 15. 15 Thank you for your attention. Marcelo Pasin Univerity of Neuchâtel, Switzerand Security and Robustness for VEDLIoT Components from Cloud through Edge
  • 17. 17 ▪ Hardware Components ▪ IoT Bridge – entry point for the VPN connection. It is placed between the IoT device and LAN. ▪ Local Gateway – functions as VPN Tunnel supplier inside the local network. It comes as a 19″ 1HE rackmount server. ▪ Network Cockpit – The control interface for the components listed above. It is a web application, which allows monitoring and configuration. With an easy-to-use web application, the Secure IoT Gateway allows complete control over IoT Bridges and IoT Gateways – the hardware counterpart that ensures encrypted and controlled network traffic. Gateway architecture