SlideShare a Scribd company logo
1 of 24
Download to read offline
Open Trust Protocol
(OTrP)
Marc Canel – VP, Security Systems, ARM Inc.
W.K. Kim, Solacia
Alin Mutu, Symantec
Ming Pei, Symantec
Nick Cook, Intercede
OTrP Spec History
• Joint effort from Open Trust Protocol Alliance founding member
companies
o ARM, Intercede, Solacia, Symantec
• A message protocol to define trust hierarchy and Trusted Application
(TA) management over the air by SP via TSM
o Basing on standard PKI
o Trust establishment from end-to-end
• FW  TEE  TA  TSM / SP
o Allow different TEE and TSM with trust selection
• Open standards
o RFC Draft: July 8, 2016, 96-th IETF
• https://tools.ietf.org/html/draft-pei-opentrustprotocol-01
o Global Platform submission consideration
Open Trust Protocol 2
Secure World Normal World
Trusted Execution Environment and TAs
3
TEE-Device
Client
Applications
Trusted
Applications
TEE
(Secure OS)
SPTAM
TAM / TEE
SDK
REE
(Android etc.)
TEE
SDK
Open Trust Protocol
The Challenge
• Adoption gap for service providers: gap between devices with
hardware security and a wish to push keys/Trusted Apps to devices
with different TEEs and vendors
• Fragmentation is growing – IOT will accelerate that fragmentation
• Lack of standards to manage TAs
o Devices have hardware based Trusted Execution Environments (TEE) but they do not have a standard
way of managing those security domains/TAs
o e.g. how to install / delete a Trusted App?
How to access hardware security when fragmentation is growing?
Open Trust Protocol 4
OTrP Design Goals
• Simplify trusted provisioning of connected devices
• Designed to work with any “hardware secure environment”
o Starting with TrustZone based TEE with wide potential in Mobile and IOT
• Creating a free specification for industry use
• Focus on re-use of existing schemes (CA and PKI) and ease of
implementation (keeping message protocol high level)
Open Trust Protocol 5
• Open and Secure framework for Over-The-Air management of Secure Keys and Trusted Application (TA)
• Based on the standard PKI (Public Key Infrastructure)
 PKI trust anchors embedded in end-points and configured in services
• Attestation between TAM and TEE-device with Key pair and Certificate for remote integrity check
• Cryptography based authentication with certified asymmetric device keys
Service ProviderTEE Device TAM
Operation Request KEY Certification Open Trusted Protocol
Certificate Authority
Basic Concept
Open Trust Protocol 6
Open Trust Ecosystem
Open Trust Protocol 7
Trusted
Execution
Environment
Provider
Trusted
Firmware
Provider
Service
Provider
Certificate
Authority
Trusted
Service
Manager
Key
Management
Public
Key
Infrastructure
Trusted
Application
Management
Secure World Normal World
Solution: Open Trust Protocol
8
TEE-Device
Client
Applications
Trusted
Applications
TEE
(Secure OS)
Trusted
Firmware
(TFW)
OTrP
Agent
SP
CA
TAM
Different CAs issue certificates to
OTrP Components
(TEE, TSM, TFW, SP)
TAM
SDK
Open Trust Protocol
Technical Spec Content
• Define trust relationship of entities
• Define JSON messages for trust and remote TA management between a TSM and TEE
o Messages for device attestation (device integrity check) by a TSM and a device to trust a TSM
o Messages for Security domain management and TA management
o Network communication among entities are left to implementations
• Define an OTrP Agent in REE (Rich Execution Environment)
o Necessary component from REE of a device to relay message exchanges between a TSM and TEE
• Use standard PKI artifacts and algorithms
• Use standard JSON messages and JSON security RFCs
Open Trust Protocol 9
• CA issues certificates to all OTrP Components (TEE, TAM, TFW, SP)
• TAM vendor provides the SDK to communicate with TAM from Client Application
• TAM communicates with OTrP Agent to relay the OTrP message between TAM and TEE
Secure World Normal World
Client AppTrusted App
TEE
Trusted Firmware
TAM SDK
OTrP Agent
SP
CA
TAM
Device OS
TEE-Device
Service Provider Trusted Application Manager TEE Vendor
OTrP System Architecture
PKI
Device
Software
OTrP
Device
Firmware
Certificate Authority
TEE
Trusted
Firmware
TAM
Client
App
OTrP
Agent
Certificate
Enrollment API
Implementation
Specific API
OTrP Message OTrP Agent API
OTrP Spec Scope
OTrP Agent
Open Trust Protocol 12
• Responsible for routing OTrP Messages to the appropriate TEE
• Most commonly developed and distributed by TEE vendor
• Implements an interface as a service, SDK, etc.
JSON Message Security and Crypto Algorithms
• Use JSON signing and encryption RFCs
o RFC 7515, JSON Web Signature (JWS)
o RFC 7516, JSON Web Encryption (JWE)
o RFC 7517, JSON Web Key (JWK)
o RFC 7518, JSON Web Algorithms (JWA)
• Supported encryption algorithms
o A128CBC-HS256
o A256CBC-HS512
• Supported signing algorithms
o RS256 (RSA 2048-bit key)
o ES256 (ECC P-256)
• Examples
o {"alg":"RS256"}
o {"alg":"ES256"}
o {"enc":"A128CBC-HS256"}
Open Trust Protocol 13
• Device Trusted Firmware and TEE identity information is never exposed to Client Applications
• Device generated key for runtime anonymous attestation
Built-in Trust and Privacy
• Reduce cost of research and development through royalty-free, open standards-based specifications, technical collaboration and solution
component integration
Interoperability & Easy Adoption
• Flexible model that relies on independent certification and managed trust
Scalability
• Open ecosystem that offers broader vendor choice for flexible, best-in-class solution deployment
No “Vendor Lock”
• Service Providers can focus on added-value and best use of hardware security capabilities
Innovation
Benefits of OTrP
Open Trust Protocol 14
Thank you!
Q&A
Contact: mingliang_pei@symantec.com
15Open Trust Protocol
BackUp
Open Trust Protocol 16
* AIK: Attestation Identity Key, TFW: Trusted Firmware
Certificate
Authority
TAMService Provider
SP Key pair
and Certificate
TAM Key pair
and Certificate
TEE Key pair
and Certificate
TFW Key pair
and Certificate
Device TEE
SP Anonymous
Key (SP AIK)
* Key pair and Certificate:
evidence of secure boot
and trustworthy firmware
* Key pair and Certificate:
used to sign a TA
* Key pair and Certificate:
device attestation
to remote TAM and SP.
* SP AIK
to encrypt TA binary data
* Key pair and Certificate:
used to issue certificate
CA Certificate
SP
Anonymous
Public Key
Trust Anchors: trusted
Root CA list of TEE Cert
Entity Key Architecture and Trust Model
* Key pair and Certificate:
sign OTrP requests to be verified
by TEE
Trust Anchors: trusted
Roots of TAM / TFW
Keys
Derived
Keys
Trust
Anchors
Key
Usage
Usage
OTrP Agent API
Open Trust Protocol 18
interface IOTrPAgentService {
String processMessage(String tsmInMsg) throws OTrPAgentException;
String getTAInformation(String spid, String taid, byte[] nonce);
}
public class OTrPAgentException extends Throwable {
private int errCode;
}
Command Descriptions
GetDeviceState • Retrieve information of TEE device state including SD and TA associated to a TAM
Command Descriptions
CreateSD • Create SD in the TEE associated to a TAM
UpdateSD • Update sub-SD within SD or SP related information
DeleteSD • Delete SD or SD related information in the TEE associated to a TAM
Command Descriptions
InstallTA • Install TA in the SD associated to a TAM
UpdateTA • Update TA in the SD associated to a TAM
DeleteTA • Delete TA in the SD associated to a TAM
 Remote Device Attestation
 Security Domain Management
 Trusted Application Management
OTrP Operations and Messages
• Security of the Operation Protocol is enhanced by applying the following three Measures:
 Verifies validity of Message Sender’s Certificate
 Verifies signature of Message Sender to check immutability
 Encrypted to guard against exposure of Sensitive data
Request to TSM for TA installation
Send [GetDeviceState] to TEE
Return DSI as a response to [GetDeviceState]
Send [CreateSD]to create SD where the TA will be installed
Send other prerequisite commands (if necessary)
Send [installTA] with encrypted TA binary and its data
 Decrypt TA binary and its
personal data.
 Install TA into target SD.
 Store personal data in
TA’s private storage.
Phase#1
“Device Attestation”
Operation request triggered and
verify Device state information
Phase#2
Prerequisite operation
(if Security domain doesn’t exist
where the TA should be installed)
Phase#3
Perform Operation requested
by SP or Client Application
TAM Client App TEE
 Create new SD
Protocol Flow
OTrP JSON Message Format and Convention
{
“<name>[Request | Response]”: {
"payload": "<payload contents of <name>TBS[Request | Response]>",
"protected":"<integrity-protected header contents>",
"header": <non-integrity-protected header contents>,
"signature":"<signature contents>"
}
}
For example:
- CreateSDRequest
- CreateSDResponse
Open Trust Protocol 21
OTrP JSON Sample Message: GetDeviceState
{
"GetDeviceStateTBSRequest": {
"ver": "1.0",
"rid": "<Unique request ID>",
"tid": "<transaction ID>",
"ocspdat": "<OCSP stapling data of TSM certificate>",
"icaocspdat": "<OCSP stapling data for TSM CA certificates>",
"supportedsigalgs": "<comma separated signing algorithms>"
}
}
{
"GetDeviceStateRequest": {
"payload":"<BASE64URL encoding of the GetDeviceStateTBSRequest JSON above>",
"protected": "<BASE64URL encoded signing algorithm>",
"header": {
"x5c": "<BASE64 encoded TSM certificate chain up to the root CA certificate>"
},
"signature":"<signature contents signed by TSM private key>"
}
}
Open Trust Protocol 22
OTrP Sample Message: CreateSD Request
{
"CreateSDTBSRequest": {
"ver": "1.0",
"rid": "<unique request ID>",
"tid": "<transaction ID>", // this may be from prior message
"tee": "<TEE routing name from the DSI for the SD's target>",
"nextdsi": "true | false",
"dsihash": "<hash of DSI returned in the prior query>",
"content": ENCRYPTED { // this piece of JSON data will be encrypted
"spid": "<SP ID value>",
"sdname": "<SD name for the domain to be created>",
"spcert": "<BASE64 encoded SP certificate>",
"tsmid": "<An identifiable attribute of the TSM certificate>",
"did": "<SHA256 hash of the TEE cert>"
}
}
}
Open Trust Protocol 23
OTrP Sample Message: CreateSD Response
{
“CreateSDTBSResponse”: {
“ver”: “1.0”,
“status”: “<operation result>”,
“rid”: “<the request ID received>”,
“tid”: “<the transaction ID received>”,
“content”: ENCRYPTED {
“reason”:”<failure reason detail>”, // optional
“did”: “<the device id received from the request>”,
“sdname”: “<SD name for the domain created>”,
“teespaik”: “<TEE SP AIK public key, BASE64 encoded>”,
“dsi”: “<Updated TEE state, including all SD owned by this TSM>”
}
}
}
Open Trust Protocol 24

More Related Content

What's hot

LAS16-100K1: Welcome Keynote
LAS16-100K1: Welcome KeynoteLAS16-100K1: Welcome Keynote
LAS16-100K1: Welcome KeynoteLinaro
 
DPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationDPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationMichelle Holley
 
Lcu14 306 - OP-TEE Future Enhancements
Lcu14 306 - OP-TEE Future EnhancementsLcu14 306 - OP-TEE Future Enhancements
Lcu14 306 - OP-TEE Future EnhancementsLinaro
 
LCU14 500 ARM Trusted Firmware
LCU14 500 ARM Trusted FirmwareLCU14 500 ARM Trusted Firmware
LCU14 500 ARM Trusted FirmwareLinaro
 
Using SoC Vendor HALs in the Zephyr Project - SFO17-112
Using SoC Vendor HALs in the Zephyr Project - SFO17-112Using SoC Vendor HALs in the Zephyr Project - SFO17-112
Using SoC Vendor HALs in the Zephyr Project - SFO17-112Linaro
 
BUD17 Socionext SC2A11 ARM Server SoC
BUD17 Socionext SC2A11 ARM Server SoCBUD17 Socionext SC2A11 ARM Server SoC
BUD17 Socionext SC2A11 ARM Server SoCLinaro
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLinaro
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Michelle Holley
 
Deploy STM32 family on Zephyr - SFO17-102
Deploy STM32 family on Zephyr - SFO17-102Deploy STM32 family on Zephyr - SFO17-102
Deploy STM32 family on Zephyr - SFO17-102Linaro
 
BKK16-309A Open Platform support in UEFI
BKK16-309A Open Platform support in UEFIBKK16-309A Open Platform support in UEFI
BKK16-309A Open Platform support in UEFILinaro
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyRamesh Nagappan
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPKrzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPPROIDEA
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Kuniyasu Suzaki
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...Ramesh Nagappan
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewMichelle Holley
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9Nil Menon
 
Linux Kernel Status Report for IEEE 802.15.4 & 6LoWPAN
Linux Kernel Status Report for IEEE 802.15.4 & 6LoWPANLinux Kernel Status Report for IEEE 802.15.4 & 6LoWPAN
Linux Kernel Status Report for IEEE 802.15.4 & 6LoWPANSamsung Open Source Group
 

What's hot (20)

LAS16-100K1: Welcome Keynote
LAS16-100K1: Welcome KeynoteLAS16-100K1: Welcome Keynote
LAS16-100K1: Welcome Keynote
 
DPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway ApplicationDPDK IPSec Security Gateway Application
DPDK IPSec Security Gateway Application
 
Lcu14 306 - OP-TEE Future Enhancements
Lcu14 306 - OP-TEE Future EnhancementsLcu14 306 - OP-TEE Future Enhancements
Lcu14 306 - OP-TEE Future Enhancements
 
LCU14 500 ARM Trusted Firmware
LCU14 500 ARM Trusted FirmwareLCU14 500 ARM Trusted Firmware
LCU14 500 ARM Trusted Firmware
 
Using SoC Vendor HALs in the Zephyr Project - SFO17-112
Using SoC Vendor HALs in the Zephyr Project - SFO17-112Using SoC Vendor HALs in the Zephyr Project - SFO17-112
Using SoC Vendor HALs in the Zephyr Project - SFO17-112
 
BUD17 Socionext SC2A11 ARM Server SoC
BUD17 Socionext SC2A11 ARM Server SoCBUD17 Socionext SC2A11 ARM Server SoC
BUD17 Socionext SC2A11 ARM Server SoC
 
LCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted FirmwareLCU13: An Introduction to ARM Trusted Firmware
LCU13: An Introduction to ARM Trusted Firmware
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
 
Deploy STM32 family on Zephyr - SFO17-102
Deploy STM32 family on Zephyr - SFO17-102Deploy STM32 family on Zephyr - SFO17-102
Deploy STM32 family on Zephyr - SFO17-102
 
Txt Introduction
Txt IntroductionTxt Introduction
Txt Introduction
 
BKK16-309A Open Platform support in UEFI
BKK16-309A Open Platform support in UEFIBKK16-309A Open Platform support in UEFI
BKK16-309A Open Platform support in UEFI
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted Cryptography
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPKrzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology Overview
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
 
Linux Kernel Status Report for IEEE 802.15.4 & 6LoWPAN
Linux Kernel Status Report for IEEE 802.15.4 & 6LoWPANLinux Kernel Status Report for IEEE 802.15.4 & 6LoWPAN
Linux Kernel Status Report for IEEE 802.15.4 & 6LoWPAN
 

Viewers also liked

LAS16-504: Secure Storage updates in OP-TEE
LAS16-504: Secure Storage updates in OP-TEELAS16-504: Secure Storage updates in OP-TEE
LAS16-504: Secure Storage updates in OP-TEELinaro
 
SFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEESFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEELinaro
 
LCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELinaro
 
HKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting ReviewHKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting ReviewLinaro
 
BKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
BKK16-211 Internet of Tiny Linux (io tl)- Status and ProgressBKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
BKK16-211 Internet of Tiny Linux (io tl)- Status and ProgressLinaro
 
BKK16-505 Kernel and Bootloader Consolidation and Upstreaming
BKK16-505 Kernel and Bootloader Consolidation and UpstreamingBKK16-505 Kernel and Bootloader Consolidation and Upstreaming
BKK16-505 Kernel and Bootloader Consolidation and UpstreamingLinaro
 
SFO15-200: Linux kernel generic TEE driver
SFO15-200: Linux kernel generic TEE driverSFO15-200: Linux kernel generic TEE driver
SFO15-200: Linux kernel generic TEE driverLinaro
 
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1Linaro
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareLinaro
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsLinaro
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareLinaro
 
HKG15-409: ARM Hibernation enablement on SoCs - a case study
HKG15-409: ARM Hibernation enablement on SoCs - a case studyHKG15-409: ARM Hibernation enablement on SoCs - a case study
HKG15-409: ARM Hibernation enablement on SoCs - a case studyLinaro
 
BUD17-400: Secure Data Path with OPTEE
BUD17-400: Secure Data Path with OPTEE BUD17-400: Secure Data Path with OPTEE
BUD17-400: Secure Data Path with OPTEE Linaro
 
LAS16-406: Android Widevine on OP-TEE
LAS16-406: Android Widevine on OP-TEELAS16-406: Android Widevine on OP-TEE
LAS16-406: Android Widevine on OP-TEELinaro
 
LAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
LAS16-402: ARM Trusted Firmware – from Enterprise to EmbeddedLAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
LAS16-402: ARM Trusted Firmware – from Enterprise to EmbeddedLinaro
 
BUD17-DF15 - Optimized Android N MR1 + 4.9 Kernel
BUD17-DF15 - Optimized Android N MR1 + 4.9 KernelBUD17-DF15 - Optimized Android N MR1 + 4.9 Kernel
BUD17-DF15 - Optimized Android N MR1 + 4.9 KernelLinaro
 
LCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platformLCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platformLinaro
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEELinaro
 
Android IPC Mechanism
Android IPC MechanismAndroid IPC Mechanism
Android IPC MechanismLihan Chen
 

Viewers also liked (20)

LAS16-504: Secure Storage updates in OP-TEE
LAS16-504: Secure Storage updates in OP-TEELAS16-504: Secure Storage updates in OP-TEE
LAS16-504: Secure Storage updates in OP-TEE
 
SFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEESFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEE
 
LCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEE
 
HKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting ReviewHKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting Review
 
BKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
BKK16-211 Internet of Tiny Linux (io tl)- Status and ProgressBKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
BKK16-211 Internet of Tiny Linux (io tl)- Status and Progress
 
BKK16-505 Kernel and Bootloader Consolidation and Upstreaming
BKK16-505 Kernel and Bootloader Consolidation and UpstreamingBKK16-505 Kernel and Bootloader Consolidation and Upstreaming
BKK16-505 Kernel and Bootloader Consolidation and Upstreaming
 
SFO15-200: Linux kernel generic TEE driver
SFO15-200: Linux kernel generic TEE driverSFO15-200: Linux kernel generic TEE driver
SFO15-200: Linux kernel generic TEE driver
 
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
BKK16-201 Play Ready OPTEE Integration with Secure Video Path lhg-1
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
 
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareHKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
 
HKG15-409: ARM Hibernation enablement on SoCs - a case study
HKG15-409: ARM Hibernation enablement on SoCs - a case studyHKG15-409: ARM Hibernation enablement on SoCs - a case study
HKG15-409: ARM Hibernation enablement on SoCs - a case study
 
BUD17-400: Secure Data Path with OPTEE
BUD17-400: Secure Data Path with OPTEE BUD17-400: Secure Data Path with OPTEE
BUD17-400: Secure Data Path with OPTEE
 
LAS16-406: Android Widevine on OP-TEE
LAS16-406: Android Widevine on OP-TEELAS16-406: Android Widevine on OP-TEE
LAS16-406: Android Widevine on OP-TEE
 
LAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
LAS16-402: ARM Trusted Firmware – from Enterprise to EmbeddedLAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
LAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
 
BUD17-DF15 - Optimized Android N MR1 + 4.9 Kernel
BUD17-DF15 - Optimized Android N MR1 + 4.9 KernelBUD17-DF15 - Optimized Android N MR1 + 4.9 Kernel
BUD17-DF15 - Optimized Android N MR1 + 4.9 Kernel
 
LCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platformLCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platform
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
2016 年春季嵌入式作業系統課程說明
2016 年春季嵌入式作業系統課程說明2016 年春季嵌入式作業系統課程說明
2016 年春季嵌入式作業系統課程說明
 
Android IPC Mechanism
Android IPC MechanismAndroid IPC Mechanism
Android IPC Mechanism
 

Similar to LAS16-306: Exploring the Open Trusted Protocol

Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming InterfaceSeculert
 
Socket programming
Socket programmingSocket programming
Socket programmingDivya Sharma
 
Securing Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy ComputingSecuring Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy ComputingThe Security of Things Forum
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALGlenn Haley
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversWithTheBest
 
RISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notesRISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notesRISC-V International
 
Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukIntel
 
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.Louis Göhl
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna centerCisco Canada
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE
 

Similar to LAS16-306: Exploring the Open Trusted Protocol (20)

Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming Interface
 
Web Security
Web SecurityWeb Security
Web Security
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Securing Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy ComputingSecuring Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy Computing
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
 
RISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notesRISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notes
 
Data trustworthiness at the edge
Data trustworthiness at the edgeData trustworthiness at the edge
Data trustworthiness at the edge
 
Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg Final
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii Tkachuk
 
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna center
 
Websecurity
Websecurity Websecurity
Websecurity
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
Application Security
Application SecurityApplication Security
Application Security
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
 

More from Linaro

Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloLinaro
 
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta VekariaArm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta VekariaLinaro
 
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua MoraHuawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua MoraLinaro
 
Bud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qaBud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qaLinaro
 
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018Linaro
 
HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018Linaro
 
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...Linaro
 
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Linaro
 
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Linaro
 
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...Linaro
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineLinaro
 
HKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening KeynoteHKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening KeynoteLinaro
 
HKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP WorkshopHKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP WorkshopLinaro
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineLinaro
 
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and allHKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and allLinaro
 
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse HypervisorHKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse HypervisorLinaro
 
HKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMUHKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMULinaro
 
HKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8MHKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8MLinaro
 
HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation Linaro
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootLinaro
 

More from Linaro (20)

Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
 
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta VekariaArm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
Arm Architecture HPC Workshop Santa Clara 2018 - Kanta Vekaria
 
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua MoraHuawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
Huawei’s requirements for the ARM based HPC solution readiness - Joshua Mora
 
Bud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qaBud17 113: distribution ci using qemu and open qa
Bud17 113: distribution ci using qemu and open qa
 
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
OpenHPC Automation with Ansible - Renato Golin - Linaro Arm HPC Workshop 2018
 
HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018HPC network stack on ARM - Linaro HPC Workshop 2018
HPC network stack on ARM - Linaro HPC Workshop 2018
 
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
It just keeps getting better - SUSE enablement for Arm - Linaro HPC Workshop ...
 
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
Intelligent Interconnect Architecture to Enable Next Generation HPC - Linaro ...
 
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
Yutaka Ishikawa - Post-K and Arm HPC Ecosystem - Linaro Arm HPC Workshop Sant...
 
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
Andrew J Younge - Vanguard Astra - Petascale Arm Platform for U.S. DOE/ASC Su...
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
 
HKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening KeynoteHKG18-100K1 - George Grey: Opening Keynote
HKG18-100K1 - George Grey: Opening Keynote
 
HKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP WorkshopHKG18-318 - OpenAMP Workshop
HKG18-318 - OpenAMP Workshop
 
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainlineHKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
HKG18-501 - EAS on Common Kernel 4.14 and getting (much) closer to mainline
 
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and allHKG18-315 - Why the ecosystem is a wonderful thing, warts and all
HKG18-315 - Why the ecosystem is a wonderful thing, warts and all
 
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse HypervisorHKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
 
HKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMUHKG18-TR08 - Upstreaming SVE in QEMU
HKG18-TR08 - Upstreaming SVE in QEMU
 
HKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8MHKG18-113- Secure Data Path work with i.MX8M
HKG18-113- Secure Data Path work with i.MX8M
 
HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation HKG18-120 - Devicetree Schema Documentation and Validation
HKG18-120 - Devicetree Schema Documentation and Validation
 
HKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted bootHKG18-223 - Trusted FirmwareM: Trusted boot
HKG18-223 - Trusted FirmwareM: Trusted boot
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

LAS16-306: Exploring the Open Trusted Protocol

  • 1. Open Trust Protocol (OTrP) Marc Canel – VP, Security Systems, ARM Inc. W.K. Kim, Solacia Alin Mutu, Symantec Ming Pei, Symantec Nick Cook, Intercede
  • 2. OTrP Spec History • Joint effort from Open Trust Protocol Alliance founding member companies o ARM, Intercede, Solacia, Symantec • A message protocol to define trust hierarchy and Trusted Application (TA) management over the air by SP via TSM o Basing on standard PKI o Trust establishment from end-to-end • FW  TEE  TA  TSM / SP o Allow different TEE and TSM with trust selection • Open standards o RFC Draft: July 8, 2016, 96-th IETF • https://tools.ietf.org/html/draft-pei-opentrustprotocol-01 o Global Platform submission consideration Open Trust Protocol 2
  • 3. Secure World Normal World Trusted Execution Environment and TAs 3 TEE-Device Client Applications Trusted Applications TEE (Secure OS) SPTAM TAM / TEE SDK REE (Android etc.) TEE SDK Open Trust Protocol
  • 4. The Challenge • Adoption gap for service providers: gap between devices with hardware security and a wish to push keys/Trusted Apps to devices with different TEEs and vendors • Fragmentation is growing – IOT will accelerate that fragmentation • Lack of standards to manage TAs o Devices have hardware based Trusted Execution Environments (TEE) but they do not have a standard way of managing those security domains/TAs o e.g. how to install / delete a Trusted App? How to access hardware security when fragmentation is growing? Open Trust Protocol 4
  • 5. OTrP Design Goals • Simplify trusted provisioning of connected devices • Designed to work with any “hardware secure environment” o Starting with TrustZone based TEE with wide potential in Mobile and IOT • Creating a free specification for industry use • Focus on re-use of existing schemes (CA and PKI) and ease of implementation (keeping message protocol high level) Open Trust Protocol 5
  • 6. • Open and Secure framework for Over-The-Air management of Secure Keys and Trusted Application (TA) • Based on the standard PKI (Public Key Infrastructure)  PKI trust anchors embedded in end-points and configured in services • Attestation between TAM and TEE-device with Key pair and Certificate for remote integrity check • Cryptography based authentication with certified asymmetric device keys Service ProviderTEE Device TAM Operation Request KEY Certification Open Trusted Protocol Certificate Authority Basic Concept Open Trust Protocol 6
  • 7. Open Trust Ecosystem Open Trust Protocol 7 Trusted Execution Environment Provider Trusted Firmware Provider Service Provider Certificate Authority Trusted Service Manager Key Management Public Key Infrastructure Trusted Application Management
  • 8. Secure World Normal World Solution: Open Trust Protocol 8 TEE-Device Client Applications Trusted Applications TEE (Secure OS) Trusted Firmware (TFW) OTrP Agent SP CA TAM Different CAs issue certificates to OTrP Components (TEE, TSM, TFW, SP) TAM SDK Open Trust Protocol
  • 9. Technical Spec Content • Define trust relationship of entities • Define JSON messages for trust and remote TA management between a TSM and TEE o Messages for device attestation (device integrity check) by a TSM and a device to trust a TSM o Messages for Security domain management and TA management o Network communication among entities are left to implementations • Define an OTrP Agent in REE (Rich Execution Environment) o Necessary component from REE of a device to relay message exchanges between a TSM and TEE • Use standard PKI artifacts and algorithms • Use standard JSON messages and JSON security RFCs Open Trust Protocol 9
  • 10. • CA issues certificates to all OTrP Components (TEE, TAM, TFW, SP) • TAM vendor provides the SDK to communicate with TAM from Client Application • TAM communicates with OTrP Agent to relay the OTrP message between TAM and TEE Secure World Normal World Client AppTrusted App TEE Trusted Firmware TAM SDK OTrP Agent SP CA TAM Device OS TEE-Device Service Provider Trusted Application Manager TEE Vendor OTrP System Architecture
  • 12. OTrP Agent Open Trust Protocol 12 • Responsible for routing OTrP Messages to the appropriate TEE • Most commonly developed and distributed by TEE vendor • Implements an interface as a service, SDK, etc.
  • 13. JSON Message Security and Crypto Algorithms • Use JSON signing and encryption RFCs o RFC 7515, JSON Web Signature (JWS) o RFC 7516, JSON Web Encryption (JWE) o RFC 7517, JSON Web Key (JWK) o RFC 7518, JSON Web Algorithms (JWA) • Supported encryption algorithms o A128CBC-HS256 o A256CBC-HS512 • Supported signing algorithms o RS256 (RSA 2048-bit key) o ES256 (ECC P-256) • Examples o {"alg":"RS256"} o {"alg":"ES256"} o {"enc":"A128CBC-HS256"} Open Trust Protocol 13
  • 14. • Device Trusted Firmware and TEE identity information is never exposed to Client Applications • Device generated key for runtime anonymous attestation Built-in Trust and Privacy • Reduce cost of research and development through royalty-free, open standards-based specifications, technical collaboration and solution component integration Interoperability & Easy Adoption • Flexible model that relies on independent certification and managed trust Scalability • Open ecosystem that offers broader vendor choice for flexible, best-in-class solution deployment No “Vendor Lock” • Service Providers can focus on added-value and best use of hardware security capabilities Innovation Benefits of OTrP Open Trust Protocol 14
  • 17. * AIK: Attestation Identity Key, TFW: Trusted Firmware Certificate Authority TAMService Provider SP Key pair and Certificate TAM Key pair and Certificate TEE Key pair and Certificate TFW Key pair and Certificate Device TEE SP Anonymous Key (SP AIK) * Key pair and Certificate: evidence of secure boot and trustworthy firmware * Key pair and Certificate: used to sign a TA * Key pair and Certificate: device attestation to remote TAM and SP. * SP AIK to encrypt TA binary data * Key pair and Certificate: used to issue certificate CA Certificate SP Anonymous Public Key Trust Anchors: trusted Root CA list of TEE Cert Entity Key Architecture and Trust Model * Key pair and Certificate: sign OTrP requests to be verified by TEE Trust Anchors: trusted Roots of TAM / TFW Keys Derived Keys Trust Anchors Key Usage Usage
  • 18. OTrP Agent API Open Trust Protocol 18 interface IOTrPAgentService { String processMessage(String tsmInMsg) throws OTrPAgentException; String getTAInformation(String spid, String taid, byte[] nonce); } public class OTrPAgentException extends Throwable { private int errCode; }
  • 19. Command Descriptions GetDeviceState • Retrieve information of TEE device state including SD and TA associated to a TAM Command Descriptions CreateSD • Create SD in the TEE associated to a TAM UpdateSD • Update sub-SD within SD or SP related information DeleteSD • Delete SD or SD related information in the TEE associated to a TAM Command Descriptions InstallTA • Install TA in the SD associated to a TAM UpdateTA • Update TA in the SD associated to a TAM DeleteTA • Delete TA in the SD associated to a TAM  Remote Device Attestation  Security Domain Management  Trusted Application Management OTrP Operations and Messages
  • 20. • Security of the Operation Protocol is enhanced by applying the following three Measures:  Verifies validity of Message Sender’s Certificate  Verifies signature of Message Sender to check immutability  Encrypted to guard against exposure of Sensitive data Request to TSM for TA installation Send [GetDeviceState] to TEE Return DSI as a response to [GetDeviceState] Send [CreateSD]to create SD where the TA will be installed Send other prerequisite commands (if necessary) Send [installTA] with encrypted TA binary and its data  Decrypt TA binary and its personal data.  Install TA into target SD.  Store personal data in TA’s private storage. Phase#1 “Device Attestation” Operation request triggered and verify Device state information Phase#2 Prerequisite operation (if Security domain doesn’t exist where the TA should be installed) Phase#3 Perform Operation requested by SP or Client Application TAM Client App TEE  Create new SD Protocol Flow
  • 21. OTrP JSON Message Format and Convention { “<name>[Request | Response]”: { "payload": "<payload contents of <name>TBS[Request | Response]>", "protected":"<integrity-protected header contents>", "header": <non-integrity-protected header contents>, "signature":"<signature contents>" } } For example: - CreateSDRequest - CreateSDResponse Open Trust Protocol 21
  • 22. OTrP JSON Sample Message: GetDeviceState { "GetDeviceStateTBSRequest": { "ver": "1.0", "rid": "<Unique request ID>", "tid": "<transaction ID>", "ocspdat": "<OCSP stapling data of TSM certificate>", "icaocspdat": "<OCSP stapling data for TSM CA certificates>", "supportedsigalgs": "<comma separated signing algorithms>" } } { "GetDeviceStateRequest": { "payload":"<BASE64URL encoding of the GetDeviceStateTBSRequest JSON above>", "protected": "<BASE64URL encoded signing algorithm>", "header": { "x5c": "<BASE64 encoded TSM certificate chain up to the root CA certificate>" }, "signature":"<signature contents signed by TSM private key>" } } Open Trust Protocol 22
  • 23. OTrP Sample Message: CreateSD Request { "CreateSDTBSRequest": { "ver": "1.0", "rid": "<unique request ID>", "tid": "<transaction ID>", // this may be from prior message "tee": "<TEE routing name from the DSI for the SD's target>", "nextdsi": "true | false", "dsihash": "<hash of DSI returned in the prior query>", "content": ENCRYPTED { // this piece of JSON data will be encrypted "spid": "<SP ID value>", "sdname": "<SD name for the domain to be created>", "spcert": "<BASE64 encoded SP certificate>", "tsmid": "<An identifiable attribute of the TSM certificate>", "did": "<SHA256 hash of the TEE cert>" } } } Open Trust Protocol 23
  • 24. OTrP Sample Message: CreateSD Response { “CreateSDTBSResponse”: { “ver”: “1.0”, “status”: “<operation result>”, “rid”: “<the request ID received>”, “tid”: “<the transaction ID received>”, “content”: ENCRYPTED { “reason”:”<failure reason detail>”, // optional “did”: “<the device id received from the request>”, “sdname”: “<SD name for the domain created>”, “teespaik”: “<TEE SP AIK public key, BASE64 encoded>”, “dsi”: “<Updated TEE state, including all SD owned by this TSM>” } } } Open Trust Protocol 24