SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Sequitur Labs Inc. Proprietary ©2014
BUILDING HARDWARE SECURED
ANDROID APPS
Abhijeet Rane
VP Marketing, Sequitur Labs Inc.
Sequitur Labs Inc. Proprietary ©2014
OVERVIEW
Our Vision
Develop enabling technologies and
solutions to better secure and manage
connected devices of today and the future.
PCs Tablets IoT
2
SmartphonesServers
Sequitur Labs Inc. Proprietary ©2014
WHY DOES IT MATTER? EVERYONE IS AT RISK.
 Business enablers: Mobile + Devices +
Cloud
 New devices and use cases
 Changing IT and information consumption
environment for end users and enterprises
 Changing and diverse security and
manageability requirements
 Traditional IT perimeter has vanished
 The promise of mobility can only be
realized if TRUST exists between users,
services and devices
 Trusted Mobility™ = creating a new
“Fabric of Trust” from Device to Cloud
$5.5 million
U.S. average cost of data breach.
3
Sequitur Labs Inc. Proprietary ©2014
WHY DOES IT MATTER? EVERYONE IS AT RISK.
Laptop(s) Theft
Snapchat Android app
hack
Data interception
Plain text passwords
stored on device
Root Causes of
Breach
Data Compromised
or Lost
Names, SS#,
Driver licenses
4.6M
usernames/phone #
Names, Account #’s,
Routing #’s
Contact Lists, Music
Laptop(s)
Theft
User passwords
(source: viaforensics analysis)
4
Sequitur Labs Inc. Proprietary ©2014
HARDWARE ROOT OF TRUST IS THE RIGHT SOLUTION FOR
PROTECTING ENTERPRISE INFORMATION ASSETS
MarketAccessibility
Relative Degree of Security
H
HL
Device Virtualization
Containers
App Wrapping
Dual Persona
Sandboxing
Encryption
SSL
Hardware
Root of Trust
Trusted Execution
Environments
Secure elements
TPM
5
Sequitur Labs Inc. Proprietary ©2014
Trustonic TEE
Trustonic
Trustonic Microkernel
Trustonic Driver
Kernel Module API
Trustonic Driver Kernel Module
Trustonic Driver
Trustonic Driver
API
6
TRUSTZONE AND THE TEE
 ARM provides the reference
design for the TrustZone to be
incorporated by
 SoC manufacturers
 Device OEMs
 Trustonic provides a Trusted
Execution Environment
(TEE)
 Protects against software attack
from open/Rich OS
 Provides scalable and secure
environment for apps like user
auth, anti-malware, transactions
 Two separate domains, normal
and secure
 Extends across entire system
 Secure
 Processing path
 On/off-chip memory
 I/O and display
 Increasingly available on
devices
Sequitur Labs Inc. Proprietary ©2014 7
A HEALTHY ECO-SYSTEM IS FORMING AROUND THE
TEE
Sequitur Labs Inc. Proprietary ©2014
DEVELOPING TEE SECURED APPS
 Requires developers with systems level development experience
 Requires learning new platform primitives
 Involves high initial and ongoing expenditure
8
Purchase TEE-
SDK
Train
developers on
TEE platform
Negotiate pilot
agreement with
Trusted
Application
Manager
(TAM)
Developer
training
session at TAM
location
Start
developing app
Include TAM
activation code
in app
Complete app
development
Negotiate
commercial
agreement with
TAM
Distribute app
on app store
Manage billing
relationship
with TAM
(Monthly
charges)
 PROBLEM: Developing TEE secured apps is not economical for the
majority of enterprises
$$$ $$$ $$$ $$
$$$
$
$$$
$
Sequitur Labs Inc. Proprietary ©2014
DeadBolt™ – DEMOCRATIZING THE TEE
 Trustonic and Sequitur Partnership
 A suite of Trusted Applications
utilizing the Trustonic TEE
 Secure file system and data storage
 Secure data-at-rest
 TEE-SSL
 Provides a secure
communications channel to
Cloud services/data centers
 Developers access TrustZone and
TEE via a library**
 Allows developers to utilize the TEE
using familiar developer tools
 .JAR file
 SDK and Customer Portal
** - requires devices to have the ARM TrustZone and Trustonic
Trusted Execution Environment (TEE)
9
Sequitur Labs Inc. Proprietary ©2014
DEVELOPING TEE SECURED APPS WITH DeadBolt™
 Does not require developers with systems level development experience
 Does not require learning new platform primitives
 Significantly lower cost of initial and ongoing investment
 Rapid time to market
10
Start developing app
Download and include
DeadBolt™ in your
app
(development license)
Complete app
development and
testing
Get activation license
for commercial
distribution
Publish app on public
or private app store
$$
 Sequitur simplifies the development and commercial activation of a TEE secured app
Sequitur
Developer
Portal
Sequitur Labs Inc. Proprietary ©2014
DeadBolt™ - KEY BENEFITS
Enterprise
Developers
Enterprise
ISVs/SIs/
Consultants
Device OEMs
Reduce time to
market and cost
Easily leverage
hardware based
security
Deliver new value
to customers
Deliver secure
application
platforms
11
Sequitur Labs Inc. Proprietary ©2014
 For more info please visit
http://www.seqlabs.com
12

Weitere ähnliche Inhalte

Was ist angesagt?

Mobicents Summit 2012 - Jonas Borjesson - Introduction to Twilio
Mobicents Summit 2012 - Jonas Borjesson - Introduction to TwilioMobicents Summit 2012 - Jonas Borjesson - Introduction to Twilio
Mobicents Summit 2012 - Jonas Borjesson - Introduction to Twilio
telestax
 

Was ist angesagt? (20)

PlumChoice_overview_external_NOV2014
PlumChoice_overview_external_NOV2014PlumChoice_overview_external_NOV2014
PlumChoice_overview_external_NOV2014
 
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentDevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production Environment
 
COMPANY PROFILE
COMPANY PROFILECOMPANY PROFILE
COMPANY PROFILE
 
What's next for AppD and Cisco? - AppD Global Tour
What's next for AppD and Cisco? - AppD Global TourWhat's next for AppD and Cisco? - AppD Global Tour
What's next for AppD and Cisco? - AppD Global Tour
 
Open Sourcing the User Experience for the IoT
Open Sourcing the User Experience for the IoTOpen Sourcing the User Experience for the IoT
Open Sourcing the User Experience for the IoT
 
A10 interopjp keynote final-2
A10 interopjp keynote final-2A10 interopjp keynote final-2
A10 interopjp keynote final-2
 
Mobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the TrenchesMobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the Trenches
 
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
 
Top Tips For AppD Adoption Success at AppD Global Tour London
Top Tips For AppD Adoption Success at AppD Global Tour LondonTop Tips For AppD Adoption Success at AppD Global Tour London
Top Tips For AppD Adoption Success at AppD Global Tour London
 
How to Transform Your Workplace with Hybrid Collaboration
How to Transform Your Workplace with Hybrid CollaborationHow to Transform Your Workplace with Hybrid Collaboration
How to Transform Your Workplace with Hybrid Collaboration
 
THREE SOTWARE COMPANY
THREE SOTWARE COMPANYTHREE SOTWARE COMPANY
THREE SOTWARE COMPANY
 
Unpacking the Power Behind Huddle Spaces
Unpacking the Power Behind Huddle SpacesUnpacking the Power Behind Huddle Spaces
Unpacking the Power Behind Huddle Spaces
 
How To Create An AppD Centre of Excellence at AppD Global Tour London
How To Create An AppD Centre of Excellence at AppD Global Tour LondonHow To Create An AppD Centre of Excellence at AppD Global Tour London
How To Create An AppD Centre of Excellence at AppD Global Tour London
 
How Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient CareHow Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient Care
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Mobicents Summit 2012 - Jonas Borjesson - Introduction to Twilio
Mobicents Summit 2012 - Jonas Borjesson - Introduction to TwilioMobicents Summit 2012 - Jonas Borjesson - Introduction to Twilio
Mobicents Summit 2012 - Jonas Borjesson - Introduction to Twilio
 
Samsung KNOX for Dummies
Samsung KNOX for DummiesSamsung KNOX for Dummies
Samsung KNOX for Dummies
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 

Andere mochten auch

LCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platformLCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platform
Linaro
 
Android sensors
Android sensorsAndroid sensors
Android sensors
datta_jini
 

Andere mochten auch (11)

LAS16 111 - Raspberry pi3, op-tee and jtag debugging
LAS16 111 - Raspberry pi3, op-tee and jtag debuggingLAS16 111 - Raspberry pi3, op-tee and jtag debugging
LAS16 111 - Raspberry pi3, op-tee and jtag debugging
 
LCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platformLCU14 302- How to port OP-TEE to another platform
LCU14 302- How to port OP-TEE to another platform
 
Camera 2.0 in Android 4.2
Camera 2.0 in Android 4.2 Camera 2.0 in Android 4.2
Camera 2.0 in Android 4.2
 
"Learning AOSP" - Android Hardware Abstraction Layer (HAL)
"Learning AOSP" - Android Hardware Abstraction Layer (HAL)"Learning AOSP" - Android Hardware Abstraction Layer (HAL)
"Learning AOSP" - Android Hardware Abstraction Layer (HAL)
 
Sensor's inside
Sensor's insideSensor's inside
Sensor's inside
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
Accessing Hardware on Android
Accessing Hardware on AndroidAccessing Hardware on Android
Accessing Hardware on Android
 
Android Hardware That's A Little Bit... Odd
Android Hardware That's A Little Bit... OddAndroid Hardware That's A Little Bit... Odd
Android Hardware That's A Little Bit... Odd
 
Sensors on android
Sensors on androidSensors on android
Sensors on android
 
Android sensors
Android sensorsAndroid sensors
Android sensors
 
Consumer decision making process : Buying a car
Consumer decision making process : Buying a car Consumer decision making process : Buying a car
Consumer decision making process : Buying a car
 

Ähnlich wie Using Hardware Security with Android Apps

Avaya: How to Give Your Business Apps Better People Skills From Oct 2013 Webinar
Avaya: How to Give Your Business Apps Better People Skills From Oct 2013 WebinarAvaya: How to Give Your Business Apps Better People Skills From Oct 2013 Webinar
Avaya: How to Give Your Business Apps Better People Skills From Oct 2013 Webinar
Avaya Inc.
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report
Low Hong Chuan
 

Ähnlich wie Using Hardware Security with Android Apps (20)

CA - Entrega Continua
CA - Entrega ContinuaCA - Entrega Continua
CA - Entrega Continua
 
Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the Cloud
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
How to Overcome the Challenges of Cloud Application
How to Overcome the Challenges of Cloud ApplicationHow to Overcome the Challenges of Cloud Application
How to Overcome the Challenges of Cloud Application
 
Avaya: How to Give Your Business Apps Better People Skills From Oct 2013 Webinar
Avaya: How to Give Your Business Apps Better People Skills From Oct 2013 WebinarAvaya: How to Give Your Business Apps Better People Skills From Oct 2013 Webinar
Avaya: How to Give Your Business Apps Better People Skills From Oct 2013 Webinar
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
Testing 12-Factor Apps
Testing 12-Factor AppsTesting 12-Factor Apps
Testing 12-Factor Apps
 
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report
 
Scaling Internet of Things
Scaling Internet of ThingsScaling Internet of Things
Scaling Internet of Things
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 

Kürzlich hochgeladen

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (6)

Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 

Using Hardware Security with Android Apps

  • 1. Sequitur Labs Inc. Proprietary ©2014 BUILDING HARDWARE SECURED ANDROID APPS Abhijeet Rane VP Marketing, Sequitur Labs Inc.
  • 2. Sequitur Labs Inc. Proprietary ©2014 OVERVIEW Our Vision Develop enabling technologies and solutions to better secure and manage connected devices of today and the future. PCs Tablets IoT 2 SmartphonesServers
  • 3. Sequitur Labs Inc. Proprietary ©2014 WHY DOES IT MATTER? EVERYONE IS AT RISK.  Business enablers: Mobile + Devices + Cloud  New devices and use cases  Changing IT and information consumption environment for end users and enterprises  Changing and diverse security and manageability requirements  Traditional IT perimeter has vanished  The promise of mobility can only be realized if TRUST exists between users, services and devices  Trusted Mobility™ = creating a new “Fabric of Trust” from Device to Cloud $5.5 million U.S. average cost of data breach. 3
  • 4. Sequitur Labs Inc. Proprietary ©2014 WHY DOES IT MATTER? EVERYONE IS AT RISK. Laptop(s) Theft Snapchat Android app hack Data interception Plain text passwords stored on device Root Causes of Breach Data Compromised or Lost Names, SS#, Driver licenses 4.6M usernames/phone # Names, Account #’s, Routing #’s Contact Lists, Music Laptop(s) Theft User passwords (source: viaforensics analysis) 4
  • 5. Sequitur Labs Inc. Proprietary ©2014 HARDWARE ROOT OF TRUST IS THE RIGHT SOLUTION FOR PROTECTING ENTERPRISE INFORMATION ASSETS MarketAccessibility Relative Degree of Security H HL Device Virtualization Containers App Wrapping Dual Persona Sandboxing Encryption SSL Hardware Root of Trust Trusted Execution Environments Secure elements TPM 5
  • 6. Sequitur Labs Inc. Proprietary ©2014 Trustonic TEE Trustonic Trustonic Microkernel Trustonic Driver Kernel Module API Trustonic Driver Kernel Module Trustonic Driver Trustonic Driver API 6 TRUSTZONE AND THE TEE  ARM provides the reference design for the TrustZone to be incorporated by  SoC manufacturers  Device OEMs  Trustonic provides a Trusted Execution Environment (TEE)  Protects against software attack from open/Rich OS  Provides scalable and secure environment for apps like user auth, anti-malware, transactions  Two separate domains, normal and secure  Extends across entire system  Secure  Processing path  On/off-chip memory  I/O and display  Increasingly available on devices
  • 7. Sequitur Labs Inc. Proprietary ©2014 7 A HEALTHY ECO-SYSTEM IS FORMING AROUND THE TEE
  • 8. Sequitur Labs Inc. Proprietary ©2014 DEVELOPING TEE SECURED APPS  Requires developers with systems level development experience  Requires learning new platform primitives  Involves high initial and ongoing expenditure 8 Purchase TEE- SDK Train developers on TEE platform Negotiate pilot agreement with Trusted Application Manager (TAM) Developer training session at TAM location Start developing app Include TAM activation code in app Complete app development Negotiate commercial agreement with TAM Distribute app on app store Manage billing relationship with TAM (Monthly charges)  PROBLEM: Developing TEE secured apps is not economical for the majority of enterprises $$$ $$$ $$$ $$ $$$ $ $$$ $
  • 9. Sequitur Labs Inc. Proprietary ©2014 DeadBolt™ – DEMOCRATIZING THE TEE  Trustonic and Sequitur Partnership  A suite of Trusted Applications utilizing the Trustonic TEE  Secure file system and data storage  Secure data-at-rest  TEE-SSL  Provides a secure communications channel to Cloud services/data centers  Developers access TrustZone and TEE via a library**  Allows developers to utilize the TEE using familiar developer tools  .JAR file  SDK and Customer Portal ** - requires devices to have the ARM TrustZone and Trustonic Trusted Execution Environment (TEE) 9
  • 10. Sequitur Labs Inc. Proprietary ©2014 DEVELOPING TEE SECURED APPS WITH DeadBolt™  Does not require developers with systems level development experience  Does not require learning new platform primitives  Significantly lower cost of initial and ongoing investment  Rapid time to market 10 Start developing app Download and include DeadBolt™ in your app (development license) Complete app development and testing Get activation license for commercial distribution Publish app on public or private app store $$  Sequitur simplifies the development and commercial activation of a TEE secured app Sequitur Developer Portal
  • 11. Sequitur Labs Inc. Proprietary ©2014 DeadBolt™ - KEY BENEFITS Enterprise Developers Enterprise ISVs/SIs/ Consultants Device OEMs Reduce time to market and cost Easily leverage hardware based security Deliver new value to customers Deliver secure application platforms 11
  • 12. Sequitur Labs Inc. Proprietary ©2014  For more info please visit http://www.seqlabs.com 12