Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into...

26
Jean-Pierre Tual, Gemalto VP Open Innovation Nereid workshop, Athens, April 6th-7th , 2017 Overview of major security trends

Transcript of Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into...

Page 1: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Jean-Pierre Tual, Gemalto VP Open Innovation

Nereid workshop, Athens, April 6th-7th , 2017

Overview of major security trends

Page 2: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Global trends

High Bandwidth Wireless World: hyperconnectivity

Smart objects: phones, tablets, wearables: mobility

Internet of Things / M2M: massive, scalability

Cloud Computing : Everything as a Service

Data explosion: Big data, Analytics and AI

HW/SW Virtualization: commoditization

Convergence IP and Telecom: ubiquity

Open Source SW: transparency

Security and privacy management: key enabler for TRUST

DIGITAL REVOLUTION

23/06/20142

Page 3: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Classical security model Embeded security model

(Server, PC,..) (M2M, IoT,….)

Protected environment

Trusted users

Direct access to data

Unprotected environment

Non trusted users

No direct access to data

Tamper resistant devices

July 8 2013

Digitization leads to a change of security model

Page 4: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Farm

Equipment

System

Planters

Combine

Harvesters

Trailers

2 Product SystemSmart

Connected

Product

1

IT goes M2M then IoT – a phase of business transformation

3

Farm

Equipment

System

Weather

Data

System

Irrigation

System

Seed

Optimization

System

Farm

Mgmt

System

Field

Sensors

Irrigation

Applicaiton

irrigation

nodes

Seed

Data

Seep

Optimizatin

Application

Farm

Performance

Database

Weather Data

ApplicationRain, Humidity,

Temp. sensors

Weather

maps

IoT System of Systems

| Management Review - 01.03.2016 - Confidential4

Smart

Product

Product

M2M transforms to IoT

Page 5: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Prediction 2: Security tops the list of IoT concerns

Source: Forrester’s Global Business Technographics® Networks And Telecommunications Survey, 2015

What are your firm’s concerns, if any, with

deploying M2M/Internet of Things

technologies? (All that apply)

March 1st, 2016M2M IoT Summit5

Page 6: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Authentication & Privacy

is Critical

Consumers and Enterprises

only want authorized entities

to have access to their devices

or data

Secure components and

solutions must be embedded

into “things” to protect data at

rest and data in motion

Hackers will take advantage,

whenever there is a security

loophole

March 1st, 2016M2M IoT Summit6

15seconds

Time required by

a hacker to

backdoor a smart

thermostat device

75,000 spam emails sent

by an internet

connected fridge

during holiday

break

471,000connected vehicles

found vulnerable to

cyber attacks

Page 7: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

BIG DATA AT REST

DATA

LIFECYCLE

DATA IN MOTION DATA IN MOTION

DATA AT REST IN THE DEVICE

DATA IN MOTION DATA IN MOTION

Influx of Data in Connected Ecosystems

Data is at rest in the device

and in the cloud

Or in motion between devices

and the cloud

The nature of data varies,

such as vehicle location data

or streamed media

Which requires different levels

of privacy and security

March 1st, 2016M2M IoT Summit7

Page 8: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

> Out-of-the-box

connectivity

> Multiple form factors

> Quality of Service

> Subscription Management

March 1st, 2016M2M IoT Summit8

Three major dimensions to address in the future

> Secure the device

> Secure the cloud

> Security lifecycle

management

MonetizeConnect

Secure

> Flexible monetization

> Licensing and entitlement

software

> IoT application upgrades

> Application Development

Page 9: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

What is the (big) problem we have to solve ?

Connected objects• Combination between massive IoT + local computing power + network connectivity => transformation

of all connected object from our day to day live give birth to an un-precedented set of usages and

threats .

• Mirai is just an appetizer!!!

Big-data issue

• In 5 years time frame it will be possible to provision for analytics purpose about ~ PB of data in less

than one hour

• Fine for legitimate organizations

• What does it imply for structured malevolent organizations or

governments?

9

Page 10: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Main Research Challenges

On the device, service side• Solve the Secure, Connect, Monetize issue

On the Big-Data side• Develop large, secure, scalable Big-Data platform efficiently coupled with massive IoT

configuration

• Algorithms and metrics to assess validity and veracity of data

• Methodologies and tools for anonymization, privacy keeping, ethics preserving => Multidisicplinary approach for scientific foundations of Cybersecurity (including Human Sciences)

On the BI/Analytics side• Increasing role of AI techniques: machine/deep learning, cooperative IA systems

• New methods for managing IA systems/Security professional interaction

• Availability of sharable massive Data Sets

10

Page 11: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Keep in mind: everything that can be hacked will be hacked !

July 8 2013

Page 12: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Scalable architecture

Remote management

Long-life cycle

Intrinsic Security

Privacy

Overall cost

July 8 2013

Major issues with embedded systems

Page 13: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Smart cards / security elements (SE)

TPMs and Hardware Root of Trust

Trusted Execution Environment

OTA servers

Trusted service manager

Device remote personalization

Basic security technology building block in embedded security

04/10/2013

Page 14: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

CPU

EEPROM

RO

M

RA

M

Tamper resistance at chip level

Shield

Glue logic

No Buses visible

Memories and buses encryption

Sensors

Blocks can be easily identified

No shield

No glue logic

Buses clearly visible

July 8 2013

Page 15: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Key challenges to address…

Physical Attacks against secure tokensInvasive probing

Reverse engineering

Fault injection

Side-Channel analysis

Relay attack

Remote attacks against S/W applicationsDoS – Denial of Service –

Man-in-the-middle

Sniffing

Spoofing

… by mean of virus, worm, buffer overflow, bug exploitation…

Mathematical attacks against cryptographic protocolsCryptanalysis

Brute force attack

Page 16: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Expected resistance to Physical and Logical attacks

Physical Attacks

Side-Channel analysis: Monitor analogsignals on all interfaces and analyze:

TimePowerElectromagnetic, ...

Fault injection: use of Laser, Glitchers,Flash light…

to bypass protections andinfer secrets.

Invasive manipulation:Chip observation

Deposit probe pads on bus lines

Reverse ROM mapping

Disconnect RNG

Cut tracks

-+

Logical Attacks

Aggressive software: Buffer overflow,Aggressive applets, Trojan Horses, Viruses…

Investigate Servers, PCs, readers and handsets configurations:

Scrutinize protocols and stackimplementations:

Page 17: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Impact on embedded SW components

The software provisioning must to the following rules

• Late personalization even after customer issuance

• Full Remote update because the components are

soldered/embedded and cannot be changed

• Scalability of deployment schemes

• Embedded local security

• Long life cycle management (bugs and security patchs)

• Flexibility according to the country and the field actors (late

customization after issuance to the final customer

Emerging concepts from the Mobile world can be

customized on purpose

• TEE

• OTA

• TSM

17Gemalto Restricted06/04/2017

Page 18: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Enforcing Security: Trusted Execution Environment (TEE)

Smartphone

Processor

Operating

System

Main OS Environment Tru

ste

d E

xe

cu

tion

En

viro

nm

en

t

Trusted Foundations™(Trusted Execution Environment OS)

APPLICATIONS

Open to

malware

Protection of

Premium content

Management & Protection

• Payment engine

• Bank authentication

• Device integrity and

management

• Corporate service

• Sensitive user data

any user modification

(e.g. “Jailbreaking”/

“Rooting”)

Crypto Secure Storage

Trusted

User

Interface

TEE Client API

July 8 2013

Page 19: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

PROTECT IDs

deviceMANAGE IDs AND

GRANT ACCESS

core

It’s important to find the right balance

Shared under NDA with Telefonica19

RISK

END-TO-END MOBILE NETWORK + SERVICE PROVIDER SECURITY FRAMEWORK

• Secure Element

• Trusted Execution

Environment

• Software

• Active Risk

Managment

• Out of Band

• Tokenisation

• Security Firmware

Upgrade

Page 20: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Full Remote Personalization

Primary Boot Loader

• Allow the downloading of the OS

• Can be embedded into the silicon

vendor dependent software

• Can be generic (consolidated market)

• Can be vendor dependent

(fragmented market)

• Independent of the OS

Operating system

• Market dependent

• Bundled with the applications

• Allow the application data saving

(before OS upgrade)

20Public06/04/2017

Page 21: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Embedded Security Choices (1)

M2M IoT Summit

Tamper resistant hardware on dedicated chip.

Dedicated hardware on generic

processor

Software

based

Software

TEE

Hardware

TEE

Dedicated

Secure

Element

+

0 on BOM++

0 on BOM

Dedicated software on

processor

+++

BOM

impact

++++

BOM

impact

Security

Difficulty &

costs

Minimum security

on generic

processor

March 1st, 20162

1

TEE: Trusted Execution Environment

BOM: Bill Of Materials

LOGO

LOGO IN BLACK

LOGO COLOR VERSIONS

LOGO ON BLACK

GTO

Page 22: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

iUICC is an integrated TRE hosting

a UICC firmware

TRE can be integrated in any

System on Chip as:

An Application Processor

A Baseband

Neutral logical communication layer

For encapsulating legacy

protocols

• APDU

• NFC HCP/HCI

Any new or application dependent

protocols

dedicated hardware resources

The TRE has its dedicated :

• RAM, ROM

• Secure Processor

Core

• Channel of

communication

The TREE may share:

• NVM

Embedded Secure Processor Core

Alternative choice: Integrated Tamper Resistant Element

With internal NVM

Page 23: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

July 8 2013

Alternative choice: Integrated Tamper Resistant Element (2)

With external

Secure NVM

With in package NVM

Page 24: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

March 1st, 2016

Cçomparison of ITRE architectures

Page 25: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

For Autonomous TRE• 40 nm CMOS with Embedded Flash or better MRAM (2020)- 28 nm in 2022 ?

• Price identical to today’s 65 nm generation

• External additional Ciphered Non Volatile Memory with PUF link

For integrated TRE• 10 nm CMOS in 2020 – 8 nm in 2022?

• Is it imaginable to have an internal NVM?

• L2 RAM (~2 MB) cache containing the image of the TRE

• External memory enciphered (Flash)

• Some Hardwired co-processors inside (AI, Crypto,…)

July 8 2013

Technology choices- 2020-2022 time Frame

Page 26: Overview of major security trends - NEREID · 2020-06-08 · solutions must be embedded into “things” to protect data at rest and data in motion Hackers will take advantage, whenever

Thanks for your attention !