SlideShare ist ein Scribd-Unternehmen logo
1 von 23
May 4, 2011 1
Evolving
Trusted
Platforms
Haydn Povey
Director Marketing
Processor Division
ARM
May 4, 2011 2
Evolving the Mobile Internet
“More people in the world will have
their first interaction with the
Internet with mobile than with
laptop” Vinton Cerf, Google
“In mobile computing, the
opportunities for innovation are
particularly exciting.... The fact
that more than 3 billion people
around the world are connected
is unbelievable, yet that is less
than half the world’s population.
Steve Ballmer, Microsoft
... and malware and software threats are increasing exponentially
May 4, 2011 3
The Issue
Over 350,000 Android handset are shipped every day
Approaching 350,000 apps on Android store
Open mobile OS’s are a blessing... and a curse
Over 350,000 Android handset are shipped every day
Approaching 350,000 apps on Android store
Open mobile OS’s are a blessing... and a curse
May 4, 2011 4
Mobile Client of 2010
OEM/Operator “Store front
Web 2.0 apps mashups
OpenGL ES 2.0 graphics
Content and its usage in all
forms is driving
consumer demand
Internet
Games
Music
Books
Video
Cortex™-A8/A9
45/32nm
OpenGL ES 2.0 GPU
(Mali-400MP(
HD video DVC
TrustZone®
LTE 50Mbps DL
Multimode
40nm
Cortex-R4
WVGA AMOLED
screen
HDMI out
Apps processorDevice trends
Modem
Basic security
concepts
introduced
May 4, 2011 5
Mobile Client of 2013
Console gaming performance
Advanced video capability
Fast broadband
Enterprise applications
Advanced multi-
processing drives
new consumer
paradigms and use
Fast battery charge
New technologies
appear in batteries
for the first time
New generation MP
22nm
New generation GPU
HD video DVC: 60fps+
TrustZone and advanced
security
LTE 100Mbps DL
28nm
New generation processor
Device trends Apps processor
Modem
Advanced
system
security
capabilities
May 4, 2011 6
Security - Foundation of the Future
Integrated security is the key capability to enable the
next generation of services and applications across
many market segments
Seamless Payment Services
Integrated Content Management
The Internet of Things
May 4, 2011 7
Traditional Security Solutions
Security traditionally seen as separate and distinct
Enables the development of physical and electrical countermeasures
These applications remain vitally important, however the technology
significantly limit the functionality of those high performance
applications which demand security
In excess of 4 Billion devices per year Secure Elements are shippedIn excess of 4 Billion devices per year Secure Elements are shipped
May 4, 2011 8
SoC Platform Security Challenges
Definitions – Are we fighting the same battles?
Advanced threat models
Device-centric Malware vs. Class Breaks (iOS cracking(
Social engineering viruses vs significant Lab Attacks
Attack goals – gifted amateur or $$$mulit-million threat
Varying definitions of “security” creates significant market fragmentation
Hardware
Guidance & standard HW foundations required to enable SW ecosystem
Secure boot integration with UEFI, etc.
Processor requirements to enable best-in-class trust and security
System IP to deliver holistic security across the SoC
Role of secure element
Certification methodology
May 4, 2011 9
SoC Platform Security Challenges
Software
Lack of standards & low portability of code restricts ecosystem
Move to standard HW framework promotes code reuse
Enables the development of standard API within industry groups,
e.g. Global Platform (www.globalplatform.org(
Simplifies integration into rich OS WM, Android, etc.
Who cares about security?
End users are typically ignorant of security risks
Hence it falls to the content owners or banks to cover the risk
The stakeholder differ by market segment but have some common
members
May 4, 2011 10
Who Cares About Mobile Security?
Security is a Continuous Evolution – not a one time task
AppMNO ServiceOSOEMSoC User
SECURITY ATTENTION METER
May 4, 2011 11
Building Secure Platforms
Three fundamental alternatives
#1–Integration of separate secure element
Very low risk as SE are well trusted (EAL 5(+
Limited integration and low speed make them of limited use
#2–Integration of secondary secure processor
Provides a higher performance and focused alternative
Challenges around area cost, HW design, and separate SW code base
and integration with main application processor, OS and apps
#3–Leverage existing application processor
High performance and naturally integrated
May 4, 2011 12
Delivering A Trusted Virtual Processor
TrustZone has major advantages
over separate secure processor
solutions:
Performance
Security at full core MHz
All resources dynamically shared
Cost
The two isolated domains are
implemented in the same
machine with no HW duplication
System Approach
Security extends to entire
memory and peripheral systems
May 4, 2011 13
TrustZone Enabled Processors
TrustZone is in the DNA of all ARM Application Processors
Cortex-A5 MPCore
Cortex-A8 & Cortex-A9 MPCore
Cortex-A15 MPCore
Cortex-A15
Cortex-A9
Cortex-A5
May 4, 2011 14
Enabling Payment Solutions
On-Chip Secure RAM area protected with TrustZone Memory Adaptor
Keyboard and screen secured dynamically to protect PIN entry
Example solution based on ARM IP
May 4, 2011 15
Enabling Fully Secured Platforms
Addition of Crypto, Media Accelerators & DMA Controller for media handling
Protection of RAM and off-chip decode
Example solution based on ARM IP
May 4, 2011 16
TrustZone “Virtual” Secure Processor
Certification is traditionally a very lengthy and expensive process
for complex SoC designs
Certification is traditionally a very lengthy and expensive process
for complex SoC designs
Picture courtesy of
Texas Instruments
May 4, 2011 17
TrustZone “Virtual” Secure Processor
TrustZone provides a smaller virtual processor significantly
reducing complexity & cost
TrustZone provides a smaller virtual processor significantly
reducing complexity & cost
Picture courtesy of
Texas Instruments
May 4, 2011 18
Virtualization and Security
Virtualization often offered as a solution for security
Virtualization focused on sharing of resources across many threads
TrustZone solutions focus on simplicity to enable certification
Future systems will require Virtualization and TrustZone
Hypervisor Secure Kernel
Secure Boot
SecureApp
Normal Secure
Host OS
Secure Driver
Secure Driver
Guest OS
Secure Driver
App
App
App
Guest OS
Secure Driver
App
App
App
Guest OS
Secure Driver
App
App
App
SecureApp
SecureApp
Monitor
App
App
App
May 4, 2011 19
P0 P1 P2 P3
SMP OS
Multi-Core Software Model
All cores in multi-core processors inherently contain TrustZone H/W
Simplicity equals security – reduced attack vectors
Single implementation of SecureOS on P0 – small footprint & blocking
operation
P1, P2, P3 implement simple stub to redirect secure requests to P0
It is possible to have multiple SecureOS instantiations however
certification complexity grows exponentially.
Normal World
SecureOSSecure World
TrustZone Device Driver
Applications
Stub Stub Stub
May 4, 2011 20
SEPIA – EU Funded research program
Secure, Embedded Platform with advanced Process Isolation and Anonymity
capabilities
EU-funded research project in the 7th FRP
5Research Partners:
Hardware & Infrastructure Lead
Software & Security Lead
Certification Lead
Secure Element & Systems Lead
Threat Analysis & Project Lead http://www.sepia-project.eu/
May 4, 2011 21
Delivering Secure Applications
Tamper Resist Storage
Secure Crypto Exe
EAL 5+ Certification
Trusted Peripherals
GPS, UI, Clock etc
Authenticated Debug
Trusted Boot
TrustedAppsProcessor+SecureElement
M
obile
Advertising
Loyalty
applications
Em
ailEncryption
D
R
M
SuperD
istribution
O
ne
Tim
e
Passw
ord
D
ata
Protection
Access
C
ontrol
Secure
FO
TA
License
M
anagem
entTicketingM
obile
TV
M
obile
Paym
ent
M
obile
B
anking
“EMV” Certification
Trusted RTE
May 4, 2011 22
Conclusion
Security must be a major focus for the entire SoC industry
In an increasingly connected world, and the Internet of Things it
is critical to focus on the “who” as well as the “how”
In power constrained devices we have to build security in from
the ground up – not as an afterthought with layers of anti-
virus software
All platforms in the future are power constrained – from the
connected washing machine to the green cloud-server
May 4, 2011 23
And Finally.....

Weitere ähnliche Inhalte

Was ist angesagt?

Webinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux DevicesWebinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux DevicesToradex
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructureIntel IT Center
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS securitySumanth Veera
 
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Vinod Kumar
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
Layer architecture of ios (1)
Layer architecture of ios (1)Layer architecture of ios (1)
Layer architecture of ios (1)dwipalp
 
Security Considerations on Hybrid Cloud
Security Considerations on Hybrid CloudSecurity Considerations on Hybrid Cloud
Security Considerations on Hybrid Clouddavsor1
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidSam Bowne
 
SecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureSecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureBlackBerry
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of ThingsBlack Duck by Synopsys
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
201104 Best Practices For Keeping Your Home Network Secure
201104   Best Practices For Keeping Your Home Network Secure201104   Best Practices For Keeping Your Home Network Secure
201104 Best Practices For Keeping Your Home Network Securermpall
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secureFort Rucker FRSA
 

Was ist angesagt? (19)

Webinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux DevicesWebinar: Secure Offline and Online Updates for Linux Devices
Webinar: Secure Offline and Online Updates for Linux Devices
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
 
Android vs iOS security
Android vs iOS securityAndroid vs iOS security
Android vs iOS security
 
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
 
Mobile security
Mobile securityMobile security
Mobile security
 
Layer architecture of ios (1)
Layer architecture of ios (1)Layer architecture of ios (1)
Layer architecture of ios (1)
 
Security Considerations on Hybrid Cloud
Security Considerations on Hybrid CloudSecurity Considerations on Hybrid Cloud
Security Considerations on Hybrid Cloud
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 
SecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise BrochureSecuSUITE for Enterprise Brochure
SecuSUITE for Enterprise Brochure
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Apple iOS
Apple iOSApple iOS
Apple iOS
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure Authentication
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of Things
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
IT Essentials Chapter 9
IT Essentials Chapter 9IT Essentials Chapter 9
IT Essentials Chapter 9
 
201104 Best Practices For Keeping Your Home Network Secure
201104   Best Practices For Keeping Your Home Network Secure201104   Best Practices For Keeping Your Home Network Secure
201104 Best Practices For Keeping Your Home Network Secure
 
Jail breaking
Jail breakingJail breaking
Jail breaking
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secure
 

Andere mochten auch

iNNOVEX2014 - Satjiv Chahil
iNNOVEX2014 - Satjiv ChahiliNNOVEX2014 - Satjiv Chahil
iNNOVEX2014 - Satjiv Chahilchiportal
 
Designing at 2x nanometers Some New Problems Appear & Some Old Ones Remain
Designing at 2x nanometers Some New Problems Appear & Some Old Ones RemainDesigning at 2x nanometers Some New Problems Appear & Some Old Ones Remain
Designing at 2x nanometers Some New Problems Appear & Some Old Ones Remainchiportal
 
Scheduler performance in manycore architecture
Scheduler performance in manycore architectureScheduler performance in manycore architecture
Scheduler performance in manycore architecturechiportal
 
Rocketick accelerated verilog simulations
Rocketick  accelerated verilog simulationsRocketick  accelerated verilog simulations
Rocketick accelerated verilog simulationschiportal
 
Track c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eveTrack c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -evechiportal
 
Track A-Shmuel Panijel, Windriver
Track A-Shmuel Panijel, WindriverTrack A-Shmuel Panijel, Windriver
Track A-Shmuel Panijel, Windriverchiportal
 
ビジネスマン必見!キレイな提案書を作るためのデザインの基礎知識
ビジネスマン必見!キレイな提案書を作るためのデザインの基礎知識ビジネスマン必見!キレイな提案書を作るためのデザインの基礎知識
ビジネスマン必見!キレイな提案書を作るためのデザインの基礎知識Tsutomu Sogitani
 

Andere mochten auch (7)

iNNOVEX2014 - Satjiv Chahil
iNNOVEX2014 - Satjiv ChahiliNNOVEX2014 - Satjiv Chahil
iNNOVEX2014 - Satjiv Chahil
 
Designing at 2x nanometers Some New Problems Appear & Some Old Ones Remain
Designing at 2x nanometers Some New Problems Appear & Some Old Ones RemainDesigning at 2x nanometers Some New Problems Appear & Some Old Ones Remain
Designing at 2x nanometers Some New Problems Appear & Some Old Ones Remain
 
Scheduler performance in manycore architecture
Scheduler performance in manycore architectureScheduler performance in manycore architecture
Scheduler performance in manycore architecture
 
Rocketick accelerated verilog simulations
Rocketick  accelerated verilog simulationsRocketick  accelerated verilog simulations
Rocketick accelerated verilog simulations
 
Track c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eveTrack c-High speed transaction-based hw-sw coverification -eve
Track c-High speed transaction-based hw-sw coverification -eve
 
Track A-Shmuel Panijel, Windriver
Track A-Shmuel Panijel, WindriverTrack A-Shmuel Panijel, Windriver
Track A-Shmuel Panijel, Windriver
 
ビジネスマン必見!キレイな提案書を作るためのデザインの基礎知識
ビジネスマン必見!キレイな提案書を作るためのデザインの基礎知識ビジネスマン必見!キレイな提案書を作るためのデザインの基礎知識
ビジネスマン必見!キレイな提案書を作るためのデザインの基礎知識
 

Ähnlich wie Track f evolving trusted platforms - arm

Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
RECENT TRENDS or ADVANCES IN EMBEDDED SYSTEMS.pptx
RECENT TRENDS or ADVANCES IN EMBEDDED SYSTEMS.pptxRECENT TRENDS or ADVANCES IN EMBEDDED SYSTEMS.pptx
RECENT TRENDS or ADVANCES IN EMBEDDED SYSTEMS.pptxBinu Dennison
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Software update for embedded systems
Software update for embedded systemsSoftware update for embedded systems
Software update for embedded systemsSZ Lin
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtityAhmed Sallam
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile EcosystemPragati Rai
 
Overview of Mobile Development Platforms
Overview of Mobile Development PlatformsOverview of Mobile Development Platforms
Overview of Mobile Development PlatformsMike Wolfson
 
Open Platform and IP Video
Open Platform and IP VideoOpen Platform and IP Video
Open Platform and IP Videohypknight
 
Java ME Open Source
Java ME Open SourceJava ME Open Source
Java ME Open Sourceguest63b060
 
IoT and the Role of Platforms
IoT and the Role of PlatformsIoT and the Role of Platforms
IoT and the Role of PlatformsTiE Bangalore
 
Symposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbedSymposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbedAustin Blackstone
 
Enea Corporate
Enea CorporateEnea Corporate
Enea CorporateTom Hayes
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Seminar report on Symbian OS
Seminar report on Symbian OSSeminar report on Symbian OS
Seminar report on Symbian OSDarsh Kotecha
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 

Ähnlich wie Track f evolving trusted platforms - arm (20)

Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
RECENT TRENDS or ADVANCES IN EMBEDDED SYSTEMS.pptx
RECENT TRENDS or ADVANCES IN EMBEDDED SYSTEMS.pptxRECENT TRENDS or ADVANCES IN EMBEDDED SYSTEMS.pptx
RECENT TRENDS or ADVANCES IN EMBEDDED SYSTEMS.pptx
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Software update for embedded systems
Software update for embedded systemsSoftware update for embedded systems
Software update for embedded systems
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile Ecosystem
 
Windows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep DiveWindows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep Dive
 
Overview of Mobile Development Platforms
Overview of Mobile Development PlatformsOverview of Mobile Development Platforms
Overview of Mobile Development Platforms
 
Open Platform and IP Video
Open Platform and IP VideoOpen Platform and IP Video
Open Platform and IP Video
 
Java ME Open Source
Java ME Open SourceJava ME Open Source
Java ME Open Source
 
IoT and the Role of Platforms
IoT and the Role of PlatformsIoT and the Role of Platforms
IoT and the Role of Platforms
 
Symposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbedSymposium on Securing the IoT - Security is the future of IoT - mbed
Symposium on Securing the IoT - Security is the future of IoT - mbed
 
Ospf
OspfOspf
Ospf
 
Enea Corporate
Enea CorporateEnea Corporate
Enea Corporate
 
Technology update
Technology updateTechnology update
Technology update
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Seminar report on Symbian OS
Seminar report on Symbian OSSeminar report on Symbian OS
Seminar report on Symbian OS
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 

Mehr von chiportal

Prof. Zhihua Wang, Tsinghua University, Beijing, China
Prof. Zhihua Wang, Tsinghua University, Beijing, China Prof. Zhihua Wang, Tsinghua University, Beijing, China
Prof. Zhihua Wang, Tsinghua University, Beijing, China chiportal
 
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...chiportal
 
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...chiportal
 
Prof. Uri Weiser,Technion
Prof. Uri Weiser,TechnionProf. Uri Weiser,Technion
Prof. Uri Weiser,Technionchiportal
 
Ken Liao, Senior Associate VP, Faraday
Ken Liao, Senior Associate VP, FaradayKen Liao, Senior Associate VP, Faraday
Ken Liao, Senior Associate VP, Faradaychiportal
 
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
 Prof. Danny Raz, Director, Bell Labs Israel, Nokia  Prof. Danny Raz, Director, Bell Labs Israel, Nokia
Prof. Danny Raz, Director, Bell Labs Israel, Nokia chiportal
 
Marco Casale-Rossi, Product Mktg. Manager, Synopsys
Marco Casale-Rossi, Product Mktg. Manager, SynopsysMarco Casale-Rossi, Product Mktg. Manager, Synopsys
Marco Casale-Rossi, Product Mktg. Manager, Synopsyschiportal
 
Dr.Efraim Aharoni, ESD Leader, TowerJazz
Dr.Efraim Aharoni, ESD Leader, TowerJazzDr.Efraim Aharoni, ESD Leader, TowerJazz
Dr.Efraim Aharoni, ESD Leader, TowerJazzchiportal
 
Eddy Kvetny, System Engineering Group Leader, Intel
Eddy Kvetny, System Engineering Group Leader, IntelEddy Kvetny, System Engineering Group Leader, Intel
Eddy Kvetny, System Engineering Group Leader, Intelchiportal
 
Dr. John Bainbridge, Principal Application Architect, NetSpeed
 Dr. John Bainbridge, Principal Application Architect, NetSpeed  Dr. John Bainbridge, Principal Application Architect, NetSpeed
Dr. John Bainbridge, Principal Application Architect, NetSpeed chiportal
 
Xavier van Ruymbeke, App. Engineer, Arteris
Xavier van Ruymbeke, App. Engineer, ArterisXavier van Ruymbeke, App. Engineer, Arteris
Xavier van Ruymbeke, App. Engineer, Arterischiportal
 
Asi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, VtoolAsi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, Vtoolchiportal
 
Zvika Rozenshein,General Manager, EngineeringIQ
Zvika Rozenshein,General Manager, EngineeringIQZvika Rozenshein,General Manager, EngineeringIQ
Zvika Rozenshein,General Manager, EngineeringIQchiportal
 
Lewis Chu,Marketing Director,GUC
Lewis Chu,Marketing Director,GUC Lewis Chu,Marketing Director,GUC
Lewis Chu,Marketing Director,GUC chiportal
 
Kunal Varshney, VLSI Engineer, Open-Silicon
Kunal Varshney, VLSI Engineer, Open-SiliconKunal Varshney, VLSI Engineer, Open-Silicon
Kunal Varshney, VLSI Engineer, Open-Siliconchiportal
 
Gert Goossens,Sen. Director, ASIP Tools, Synopsys
Gert Goossens,Sen. Director, ASIP Tools, SynopsysGert Goossens,Sen. Director, ASIP Tools, Synopsys
Gert Goossens,Sen. Director, ASIP Tools, Synopsyschiportal
 
Tuvia Liran, Director of VLSI, Nano Retina
Tuvia Liran, Director of VLSI, Nano RetinaTuvia Liran, Director of VLSI, Nano Retina
Tuvia Liran, Director of VLSI, Nano Retinachiportal
 
Sagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-SiliconSagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-Siliconchiportal
 
Ronen Shtayer,Director of ASG Operations & PMO, NXP Semiconductor
Ronen Shtayer,Director of ASG Operations & PMO, NXP SemiconductorRonen Shtayer,Director of ASG Operations & PMO, NXP Semiconductor
Ronen Shtayer,Director of ASG Operations & PMO, NXP Semiconductorchiportal
 
Prof. Emanuel Cohen, Technion
Prof. Emanuel Cohen, TechnionProf. Emanuel Cohen, Technion
Prof. Emanuel Cohen, Technionchiportal
 

Mehr von chiportal (20)

Prof. Zhihua Wang, Tsinghua University, Beijing, China
Prof. Zhihua Wang, Tsinghua University, Beijing, China Prof. Zhihua Wang, Tsinghua University, Beijing, China
Prof. Zhihua Wang, Tsinghua University, Beijing, China
 
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
 
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
 
Prof. Uri Weiser,Technion
Prof. Uri Weiser,TechnionProf. Uri Weiser,Technion
Prof. Uri Weiser,Technion
 
Ken Liao, Senior Associate VP, Faraday
Ken Liao, Senior Associate VP, FaradayKen Liao, Senior Associate VP, Faraday
Ken Liao, Senior Associate VP, Faraday
 
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
 Prof. Danny Raz, Director, Bell Labs Israel, Nokia  Prof. Danny Raz, Director, Bell Labs Israel, Nokia
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
 
Marco Casale-Rossi, Product Mktg. Manager, Synopsys
Marco Casale-Rossi, Product Mktg. Manager, SynopsysMarco Casale-Rossi, Product Mktg. Manager, Synopsys
Marco Casale-Rossi, Product Mktg. Manager, Synopsys
 
Dr.Efraim Aharoni, ESD Leader, TowerJazz
Dr.Efraim Aharoni, ESD Leader, TowerJazzDr.Efraim Aharoni, ESD Leader, TowerJazz
Dr.Efraim Aharoni, ESD Leader, TowerJazz
 
Eddy Kvetny, System Engineering Group Leader, Intel
Eddy Kvetny, System Engineering Group Leader, IntelEddy Kvetny, System Engineering Group Leader, Intel
Eddy Kvetny, System Engineering Group Leader, Intel
 
Dr. John Bainbridge, Principal Application Architect, NetSpeed
 Dr. John Bainbridge, Principal Application Architect, NetSpeed  Dr. John Bainbridge, Principal Application Architect, NetSpeed
Dr. John Bainbridge, Principal Application Architect, NetSpeed
 
Xavier van Ruymbeke, App. Engineer, Arteris
Xavier van Ruymbeke, App. Engineer, ArterisXavier van Ruymbeke, App. Engineer, Arteris
Xavier van Ruymbeke, App. Engineer, Arteris
 
Asi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, VtoolAsi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, Vtool
 
Zvika Rozenshein,General Manager, EngineeringIQ
Zvika Rozenshein,General Manager, EngineeringIQZvika Rozenshein,General Manager, EngineeringIQ
Zvika Rozenshein,General Manager, EngineeringIQ
 
Lewis Chu,Marketing Director,GUC
Lewis Chu,Marketing Director,GUC Lewis Chu,Marketing Director,GUC
Lewis Chu,Marketing Director,GUC
 
Kunal Varshney, VLSI Engineer, Open-Silicon
Kunal Varshney, VLSI Engineer, Open-SiliconKunal Varshney, VLSI Engineer, Open-Silicon
Kunal Varshney, VLSI Engineer, Open-Silicon
 
Gert Goossens,Sen. Director, ASIP Tools, Synopsys
Gert Goossens,Sen. Director, ASIP Tools, SynopsysGert Goossens,Sen. Director, ASIP Tools, Synopsys
Gert Goossens,Sen. Director, ASIP Tools, Synopsys
 
Tuvia Liran, Director of VLSI, Nano Retina
Tuvia Liran, Director of VLSI, Nano RetinaTuvia Liran, Director of VLSI, Nano Retina
Tuvia Liran, Director of VLSI, Nano Retina
 
Sagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-SiliconSagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-Silicon
 
Ronen Shtayer,Director of ASG Operations & PMO, NXP Semiconductor
Ronen Shtayer,Director of ASG Operations & PMO, NXP SemiconductorRonen Shtayer,Director of ASG Operations & PMO, NXP Semiconductor
Ronen Shtayer,Director of ASG Operations & PMO, NXP Semiconductor
 
Prof. Emanuel Cohen, Technion
Prof. Emanuel Cohen, TechnionProf. Emanuel Cohen, Technion
Prof. Emanuel Cohen, Technion
 

Kürzlich hochgeladen

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Kürzlich hochgeladen (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Track f evolving trusted platforms - arm

  • 1. May 4, 2011 1 Evolving Trusted Platforms Haydn Povey Director Marketing Processor Division ARM
  • 2. May 4, 2011 2 Evolving the Mobile Internet “More people in the world will have their first interaction with the Internet with mobile than with laptop” Vinton Cerf, Google “In mobile computing, the opportunities for innovation are particularly exciting.... The fact that more than 3 billion people around the world are connected is unbelievable, yet that is less than half the world’s population. Steve Ballmer, Microsoft ... and malware and software threats are increasing exponentially
  • 3. May 4, 2011 3 The Issue Over 350,000 Android handset are shipped every day Approaching 350,000 apps on Android store Open mobile OS’s are a blessing... and a curse Over 350,000 Android handset are shipped every day Approaching 350,000 apps on Android store Open mobile OS’s are a blessing... and a curse
  • 4. May 4, 2011 4 Mobile Client of 2010 OEM/Operator “Store front Web 2.0 apps mashups OpenGL ES 2.0 graphics Content and its usage in all forms is driving consumer demand Internet Games Music Books Video Cortex™-A8/A9 45/32nm OpenGL ES 2.0 GPU (Mali-400MP( HD video DVC TrustZone® LTE 50Mbps DL Multimode 40nm Cortex-R4 WVGA AMOLED screen HDMI out Apps processorDevice trends Modem Basic security concepts introduced
  • 5. May 4, 2011 5 Mobile Client of 2013 Console gaming performance Advanced video capability Fast broadband Enterprise applications Advanced multi- processing drives new consumer paradigms and use Fast battery charge New technologies appear in batteries for the first time New generation MP 22nm New generation GPU HD video DVC: 60fps+ TrustZone and advanced security LTE 100Mbps DL 28nm New generation processor Device trends Apps processor Modem Advanced system security capabilities
  • 6. May 4, 2011 6 Security - Foundation of the Future Integrated security is the key capability to enable the next generation of services and applications across many market segments Seamless Payment Services Integrated Content Management The Internet of Things
  • 7. May 4, 2011 7 Traditional Security Solutions Security traditionally seen as separate and distinct Enables the development of physical and electrical countermeasures These applications remain vitally important, however the technology significantly limit the functionality of those high performance applications which demand security In excess of 4 Billion devices per year Secure Elements are shippedIn excess of 4 Billion devices per year Secure Elements are shipped
  • 8. May 4, 2011 8 SoC Platform Security Challenges Definitions – Are we fighting the same battles? Advanced threat models Device-centric Malware vs. Class Breaks (iOS cracking( Social engineering viruses vs significant Lab Attacks Attack goals – gifted amateur or $$$mulit-million threat Varying definitions of “security” creates significant market fragmentation Hardware Guidance & standard HW foundations required to enable SW ecosystem Secure boot integration with UEFI, etc. Processor requirements to enable best-in-class trust and security System IP to deliver holistic security across the SoC Role of secure element Certification methodology
  • 9. May 4, 2011 9 SoC Platform Security Challenges Software Lack of standards & low portability of code restricts ecosystem Move to standard HW framework promotes code reuse Enables the development of standard API within industry groups, e.g. Global Platform (www.globalplatform.org( Simplifies integration into rich OS WM, Android, etc. Who cares about security? End users are typically ignorant of security risks Hence it falls to the content owners or banks to cover the risk The stakeholder differ by market segment but have some common members
  • 10. May 4, 2011 10 Who Cares About Mobile Security? Security is a Continuous Evolution – not a one time task AppMNO ServiceOSOEMSoC User SECURITY ATTENTION METER
  • 11. May 4, 2011 11 Building Secure Platforms Three fundamental alternatives #1–Integration of separate secure element Very low risk as SE are well trusted (EAL 5(+ Limited integration and low speed make them of limited use #2–Integration of secondary secure processor Provides a higher performance and focused alternative Challenges around area cost, HW design, and separate SW code base and integration with main application processor, OS and apps #3–Leverage existing application processor High performance and naturally integrated
  • 12. May 4, 2011 12 Delivering A Trusted Virtual Processor TrustZone has major advantages over separate secure processor solutions: Performance Security at full core MHz All resources dynamically shared Cost The two isolated domains are implemented in the same machine with no HW duplication System Approach Security extends to entire memory and peripheral systems
  • 13. May 4, 2011 13 TrustZone Enabled Processors TrustZone is in the DNA of all ARM Application Processors Cortex-A5 MPCore Cortex-A8 & Cortex-A9 MPCore Cortex-A15 MPCore Cortex-A15 Cortex-A9 Cortex-A5
  • 14. May 4, 2011 14 Enabling Payment Solutions On-Chip Secure RAM area protected with TrustZone Memory Adaptor Keyboard and screen secured dynamically to protect PIN entry Example solution based on ARM IP
  • 15. May 4, 2011 15 Enabling Fully Secured Platforms Addition of Crypto, Media Accelerators & DMA Controller for media handling Protection of RAM and off-chip decode Example solution based on ARM IP
  • 16. May 4, 2011 16 TrustZone “Virtual” Secure Processor Certification is traditionally a very lengthy and expensive process for complex SoC designs Certification is traditionally a very lengthy and expensive process for complex SoC designs Picture courtesy of Texas Instruments
  • 17. May 4, 2011 17 TrustZone “Virtual” Secure Processor TrustZone provides a smaller virtual processor significantly reducing complexity & cost TrustZone provides a smaller virtual processor significantly reducing complexity & cost Picture courtesy of Texas Instruments
  • 18. May 4, 2011 18 Virtualization and Security Virtualization often offered as a solution for security Virtualization focused on sharing of resources across many threads TrustZone solutions focus on simplicity to enable certification Future systems will require Virtualization and TrustZone Hypervisor Secure Kernel Secure Boot SecureApp Normal Secure Host OS Secure Driver Secure Driver Guest OS Secure Driver App App App Guest OS Secure Driver App App App Guest OS Secure Driver App App App SecureApp SecureApp Monitor App App App
  • 19. May 4, 2011 19 P0 P1 P2 P3 SMP OS Multi-Core Software Model All cores in multi-core processors inherently contain TrustZone H/W Simplicity equals security – reduced attack vectors Single implementation of SecureOS on P0 – small footprint & blocking operation P1, P2, P3 implement simple stub to redirect secure requests to P0 It is possible to have multiple SecureOS instantiations however certification complexity grows exponentially. Normal World SecureOSSecure World TrustZone Device Driver Applications Stub Stub Stub
  • 20. May 4, 2011 20 SEPIA – EU Funded research program Secure, Embedded Platform with advanced Process Isolation and Anonymity capabilities EU-funded research project in the 7th FRP 5Research Partners: Hardware & Infrastructure Lead Software & Security Lead Certification Lead Secure Element & Systems Lead Threat Analysis & Project Lead http://www.sepia-project.eu/
  • 21. May 4, 2011 21 Delivering Secure Applications Tamper Resist Storage Secure Crypto Exe EAL 5+ Certification Trusted Peripherals GPS, UI, Clock etc Authenticated Debug Trusted Boot TrustedAppsProcessor+SecureElement M obile Advertising Loyalty applications Em ailEncryption D R M SuperD istribution O ne Tim e Passw ord D ata Protection Access C ontrol Secure FO TA License M anagem entTicketingM obile TV M obile Paym ent M obile B anking “EMV” Certification Trusted RTE
  • 22. May 4, 2011 22 Conclusion Security must be a major focus for the entire SoC industry In an increasingly connected world, and the Internet of Things it is critical to focus on the “who” as well as the “how” In power constrained devices we have to build security in from the ground up – not as an afterthought with layers of anti- virus software All platforms in the future are power constrained – from the connected washing machine to the green cloud-server
  • 23. May 4, 2011 23 And Finally.....