SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
3 
| © 2014 Wind River. All Rights Reserved. 
ENABLING EMBEDDED SECURITY FOR THE INTERNET OF THINGS 
Michel Chabroux, Senior Product Manager, Wind River 
Marco Blume, Product Manager, WIBU Systems
4 
| © 2014 Wind River. All Rights Reserved. 
Agenda 
VxWorks Overview 
A Story… 
Who needs security and why? 
Security Profile for VxWorks Overview 
Key Benefits 
Key Features 
Enhancement Options 
Sample Applications 
CodeMeterSecurity
5 
| © 2014 Wind River. All Rights Reserved. 
World’s most widely used commercial RTOS 
Unrivaled technology partner ecosystem 
Best-in-class foundation for creating differentiated, IoT-ready intelligent devices 
VxWorks 
The RTOS for the Internet of Things 
Unrivaled Performance 
Modular, Scalable Design 
Safety and Security 
Virtualization
6 
| © 2014 Wind River. All Rights Reserved. 
WHAT DO AIR CONDITIONERS HAVE TO DO WITH IDENTITY THEFT? 
A Story…
7 | © 2014 Wind River. All Rights Reserved. 
A well known retailer has experienced a 
security breach resulting in identity theft 
for millions of consumers. 
The breach actually began when the 
retailer’s HVAC maintenance vendor was 
broken into. 
Network passwords the vendor used to 
monitor the retailer’s HVAC systems 
were stolen. 
These same passwords gave hackers 
network access to the retailers Point-of- 
Sale machines. 
With this access, hackers installed 
malicious software that captured Credit 
Card data the time of transactions. 
Taking place over the holiday season, 
the attack captured the identity data from 
millions of unsuspecting shoppers. 
Everything connected must be secure!
9 
| © 2014 Wind River. All Rights Reserved. 
From Islands to Networked Constructions 
New Attack Vectors for Cyber Physical Systems 
A Cyber Physical System(CPS) is a system of collaborating computational elements controlling physical entities* 
* Wikipedia
10 
| © 2014 Wind River. All Rights Reserved. 
Security Threats 
Operator 
Manipulation 
–Sabotage 
–Human mistakes 
–Intelligence services / Displeased employees 
Intellectual property 
–Recipes 
–Configuration data 
Production data 
–Machine log 
–Produced amounts 
Manufacturer 
Cloning of a machine 
Imitation of a machine 
–Extraction of intellectual property (reverse engineering) 
Manipulation (warranty) 
–Not authorized updates 
–Manipulation of counters 
–Manipulation of flight records 
Not authorized access to source code
11 
| © 2014 Wind River. All Rights Reserved. 
Copy protection 
IP protection 
Integrity 
Authenticity 
Security Objectives
12 
| © 2014 Wind River. All Rights Reserved. 
A collection of software-based security features to effectively safeguard devices and data 
Compatible with VxWorks 7 Core Platform and all industry- specific profiles for VxWorks 7 
Can be reinforced with a hardware-based solution from Wibu- Systems for high security applications and flexible licensing 
Security Profile for VxWorks 
Comprehensive Security for Your IoT-Ready Devices
13 
| © 2014 Wind River. All Rights Reserved. 
Solid foundation for security- sensitive applications 
Flexible, configurable, readily expandable security suite 
Upgradeable, future-proof solution 
Protection for your intellectual property 
Security Profile for VxWorks 
Key Benefits
14 
| © 2014 Wind River. All Rights Reserved. 
Security Profile for VxWorks 
Key Features 
Protect from tampering with code and unauthorized access. 
Safeguard data even when the device is powered down. 
Secure network communications and prevent attacks. 
Prevent execution of non-authentic code. 
Boot-up 
Operation 
Data Transmission 
Rest/ Shutdown 
Secure Boot 
Digital signature verification 
Decryption* 
Secure Run-Time Loader 
Digital signature verification 
Decryption* 
Advanced User Management 
Prevention of unauthorized access 
Help for creating and enforcing user- based policies 
Network Security 
OpenSSL 
SSH 
Cryptography Libraries 
IPsec and IKE 
Encrypted Containers 
TrueCrypt-compatible AES-encrypted file containers 
Ability for data in containers to remain encrypted even when the device is idle or powered off 
Passkey protection using customizable functions 
* Can be enabled or disabled
15 
| © 2014 Wind River. All Rights Reserved. 
Security Profile for VxWorks 
Key Features –Secure Loader 
UEFI 
VxWorks Image 
TrustedbyUEFI 
Signer‘s certificate 
SignedbyWind River Workbenchuser 
Signer‘s certificate in Bootloader 
Applications 
(LKMs/DKMs, RTPs) 
SignedbyWind River Workbenchuser 
Signer‘s certificate in VxWorksimage 
Proprietary Wind River EFI loader
16 
| © 2014 Wind River. All Rights Reserved. 
Security Profile for VxWorks 
Key Features –Digital Signature 
Wibu CaTool 
Based on elliptic curve cryptography (ECC) 
Lead generates the root key and certificate 
Lead signs certificates for other developers 
–Signs requests from other developers 
–Creates signer’s keys and signs certificates 
Lead sends signed certificates to individual developers
17 
| © 2014 Wind River. All Rights Reserved. 
Security Profile for VxWorks 
Key Features –Encryption 
AES encryption 
Configured from VxWorks Source Build
18 
| © 2014 Wind River. All Rights Reserved. 
Security Profile for VxWorks 
Key Features –Advanced User Management 
User database 
–No default user 
–Dynamic definition of users 
–Customizable encryption keys 
If enabled, all access to target will require a login
19 
| © 2014 Wind River. All Rights Reserved. 
Security Profile for VxWorks 
Key Features –Encrypted Containers 
Protect data at rest 
–Files are encrypted at all times using AES encryption 
TrueCrypt-compatible containers 
Can be created on any host platform 
Can be configured to mount automatically 
Passphrase encryption can be customized
20 
| © 2014 Wind River. All Rights Reserved. 
Security Profile for VxWorks 
Enhancement for Security-Critical Applications 
Software-based security delivered by Security Profile can be reinforced with CodeMeter®hardware-based security by Wibu-Systems. 
CodeMeter Security adds flexible licensing and hardware binding 
CodeMeterLicense Central 
VxWorks 7 Core Platform 
Security Profile for VxWorks 
Wibu-Systems Basic Security 
IP Protection 
Integrity Protection 
Wibu-Systems CodeMeter 
Hardware Protection 
License Management
21 
| © 2014 Wind River. All Rights Reserved. 
Prevention of operation disruptions, public security risks, and industrial espionage 
–Hacking, tampering, and unauthorized access to power grid and plant control systems 
–Piracy, illegal cloning, and code reverse- engineering 
Protection via: 
–Encryption 
–Digital signatures 
–Advanced user management 
–Secure remote access 
–Hardware-based security 
Security Profile for VxWorks 
Use Case –Industrial Systems and Energy
22 
| © 2014 Wind River. All Rights Reserved. 
Protection of sensitive data in transit and at rest 
–Safeguarding patient data (HIPAA) 
Encryption and user management 
–Protection of manufacturer-proprietary information stored onboard 
Encrypted containers 
Protection from tampering with medical device software 
–Digital signatures 
Prevention of piracy and reverse- engineering 
–Encryption and hardware-based security 
Security Profile for VxWorks 
Use Case –Medical Devices
23 
| © 2014 Wind River. All Rights Reserved. 
Hardware-based key store 
License management 
New business models 
Business process integration of license and rights deployment using CodeMeterLicense Central 
Upgrading to CodeMeterSecurity 
Additional Opportunities
24 
| © 2014 Wind River. All Rights Reserved. 
Wibu-Systems CodeMeter Dongle Overview 
ASIC 
μSD 
SD Card 
CF Card 
USB Dongle 
Smart card based hardware security 
Industry compliant hardware 
Optional SLC flash memory 
Communication as HID device for USB possible 
Many Form Factors –One Technology
25 
| © 2014 Wind River. All Rights Reserved. 
Wibu-Systems CmActLicense 
Software based license 
Same features as CodeMeter dongles 
Bound to target system fingerprint
26 
| © 2014 Wind River. All Rights Reserved. 
Wibu-Systems CodeMeter License Central 
CodeMeter License Central 
–Design of license models 
–Creation, delivery and management of licenses 
Benefits 
–Cost and time reduction thanks to integration and automation into business processes 
–Additional revenue streams through flexible licensing models 
–New customers and new markets 
Support for CmDonglesand CmActLicenses
27 
| © 2014 Wind River. All Rights Reserved. 
Process Integration 
Wibu-Systems CodeMeterLicense Central 
Integration in ERP, CRM, e-shop and customers’ portals 
Manufacturer 
User 
Cloud 
Ticket / 
Fingerprint 
4 
Ticket: 
ABCDE-FGHIJ-KLMNO-PQRST-UVWXY 
3 
Update file(License) 
5 
Ticket 
2 
SKU 
1
28 
| © 2014 Wind River. All Rights Reserved. 
Where to Buy 
VxWorksSecurity Profile is distributed by Wind River 
License Central, CmDonglesand CmActLicensesare distributed by Wibu-Systems
29 
| © 2014 Wind River. All Rights Reserved. 
More Information 
Toll-free: 800-545-WIND (800-545-9463) 
Toll-free (EMEA): +00-800-4988-4988 
www.vxworks.com 
Wibu-Systems 
 Germany:+49-721-93172-0 
 USA:+1-425-775-6900 
 China:+86-21-5566-1790 
 www.wibu.com
30 
| © 2014 Wind River. All Rights Reserved.

Weitere ähnliche Inhalte

Andere mochten auch

EMBEDDED WEB SERVER
EMBEDDED WEB SERVEREMBEDDED WEB SERVER
EMBEDDED WEB SERVERkavya Reddy
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
Gsm technology
Gsm technologyGsm technology
Gsm technologyggrajan46
 
How & Why SME's Go On The Internet
How & Why SME's Go On The InternetHow & Why SME's Go On The Internet
How & Why SME's Go On The InternetThom. Poole
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityThom. Poole
 
Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devicesYashin Mehaboobe
 
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Jaap van Ekris
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Embedded web technology
Embedded web technologyEmbedded web technology
Embedded web technologyPavan kumar
 
Securing embedded systems (for share)
Securing embedded systems (for share)Securing embedded systems (for share)
Securing embedded systems (for share)AndrewRJamieson
 

Andere mochten auch (16)

EMBEDDED WEB SERVER
EMBEDDED WEB SERVEREMBEDDED WEB SERVER
EMBEDDED WEB SERVER
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Embedded System Basics
Embedded System BasicsEmbedded System Basics
Embedded System Basics
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 
Gsm technology
Gsm technologyGsm technology
Gsm technology
 
How & Why SME's Go On The Internet
How & Why SME's Go On The InternetHow & Why SME's Go On The Internet
How & Why SME's Go On The Internet
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things
 
6 weeks training on Embedded System
6 weeks training on Embedded System6 weeks training on Embedded System
6 weeks training on Embedded System
 
Timers
TimersTimers
Timers
 
Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devices
 
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotter...
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Embedded web technology
Embedded web technologyEmbedded web technology
Embedded web technology
 
Securing embedded systems (for share)
Securing embedded systems (for share)Securing embedded systems (for share)
Securing embedded systems (for share)
 

Ähnlich wie Enabling embedded security for the Internet of Things

Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 parisMarcel Hartgerink
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgEric Vanderburg
 
Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensedteam-WIBU
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringWaterfall Security Solutions
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesteam-WIBU
 
Confidential Computing overview
Confidential Computing overviewConfidential Computing overview
Confidential Computing overviewMark Argent
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdfYounesChafi1
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrialSherid444
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
Emc vi pr data services
Emc vi pr data servicesEmc vi pr data services
Emc vi pr data servicessolarisyougood
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmHiveMQ
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Bunmi Sowande
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021VMware Tanzu
 

Ähnlich wie Enabling embedded security for the Internet of Things (20)

Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 paris
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
 
Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensed
 
Cloud security
Cloud securityCloud security
Cloud security
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
Confidential Computing overview
Confidential Computing overviewConfidential Computing overview
Confidential Computing overview
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrial
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Emc vi pr data services
Emc vi pr data servicesEmc vi pr data services
Emc vi pr data services
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
 
FLIR United VMS
FLIR United VMSFLIR United VMS
FLIR United VMS
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
 

Mehr von team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Togetherteam-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityteam-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenariosteam-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses Moreteam-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edgeteam-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applicationsteam-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magicteam-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisiveteam-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxteam-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solutionteam-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsteam-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to lastteam-WIBU
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applicationsteam-WIBU
 

Mehr von team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
 

Kürzlich hochgeladen

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 

Kürzlich hochgeladen (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 

Enabling embedded security for the Internet of Things

  • 1. 3 | © 2014 Wind River. All Rights Reserved. ENABLING EMBEDDED SECURITY FOR THE INTERNET OF THINGS Michel Chabroux, Senior Product Manager, Wind River Marco Blume, Product Manager, WIBU Systems
  • 2. 4 | © 2014 Wind River. All Rights Reserved. Agenda VxWorks Overview A Story… Who needs security and why? Security Profile for VxWorks Overview Key Benefits Key Features Enhancement Options Sample Applications CodeMeterSecurity
  • 3. 5 | © 2014 Wind River. All Rights Reserved. World’s most widely used commercial RTOS Unrivaled technology partner ecosystem Best-in-class foundation for creating differentiated, IoT-ready intelligent devices VxWorks The RTOS for the Internet of Things Unrivaled Performance Modular, Scalable Design Safety and Security Virtualization
  • 4. 6 | © 2014 Wind River. All Rights Reserved. WHAT DO AIR CONDITIONERS HAVE TO DO WITH IDENTITY THEFT? A Story…
  • 5. 7 | © 2014 Wind River. All Rights Reserved. A well known retailer has experienced a security breach resulting in identity theft for millions of consumers. The breach actually began when the retailer’s HVAC maintenance vendor was broken into. Network passwords the vendor used to monitor the retailer’s HVAC systems were stolen. These same passwords gave hackers network access to the retailers Point-of- Sale machines. With this access, hackers installed malicious software that captured Credit Card data the time of transactions. Taking place over the holiday season, the attack captured the identity data from millions of unsuspecting shoppers. Everything connected must be secure!
  • 6. 9 | © 2014 Wind River. All Rights Reserved. From Islands to Networked Constructions New Attack Vectors for Cyber Physical Systems A Cyber Physical System(CPS) is a system of collaborating computational elements controlling physical entities* * Wikipedia
  • 7. 10 | © 2014 Wind River. All Rights Reserved. Security Threats Operator Manipulation –Sabotage –Human mistakes –Intelligence services / Displeased employees Intellectual property –Recipes –Configuration data Production data –Machine log –Produced amounts Manufacturer Cloning of a machine Imitation of a machine –Extraction of intellectual property (reverse engineering) Manipulation (warranty) –Not authorized updates –Manipulation of counters –Manipulation of flight records Not authorized access to source code
  • 8. 11 | © 2014 Wind River. All Rights Reserved. Copy protection IP protection Integrity Authenticity Security Objectives
  • 9. 12 | © 2014 Wind River. All Rights Reserved. A collection of software-based security features to effectively safeguard devices and data Compatible with VxWorks 7 Core Platform and all industry- specific profiles for VxWorks 7 Can be reinforced with a hardware-based solution from Wibu- Systems for high security applications and flexible licensing Security Profile for VxWorks Comprehensive Security for Your IoT-Ready Devices
  • 10. 13 | © 2014 Wind River. All Rights Reserved. Solid foundation for security- sensitive applications Flexible, configurable, readily expandable security suite Upgradeable, future-proof solution Protection for your intellectual property Security Profile for VxWorks Key Benefits
  • 11. 14 | © 2014 Wind River. All Rights Reserved. Security Profile for VxWorks Key Features Protect from tampering with code and unauthorized access. Safeguard data even when the device is powered down. Secure network communications and prevent attacks. Prevent execution of non-authentic code. Boot-up Operation Data Transmission Rest/ Shutdown Secure Boot Digital signature verification Decryption* Secure Run-Time Loader Digital signature verification Decryption* Advanced User Management Prevention of unauthorized access Help for creating and enforcing user- based policies Network Security OpenSSL SSH Cryptography Libraries IPsec and IKE Encrypted Containers TrueCrypt-compatible AES-encrypted file containers Ability for data in containers to remain encrypted even when the device is idle or powered off Passkey protection using customizable functions * Can be enabled or disabled
  • 12. 15 | © 2014 Wind River. All Rights Reserved. Security Profile for VxWorks Key Features –Secure Loader UEFI VxWorks Image TrustedbyUEFI Signer‘s certificate SignedbyWind River Workbenchuser Signer‘s certificate in Bootloader Applications (LKMs/DKMs, RTPs) SignedbyWind River Workbenchuser Signer‘s certificate in VxWorksimage Proprietary Wind River EFI loader
  • 13. 16 | © 2014 Wind River. All Rights Reserved. Security Profile for VxWorks Key Features –Digital Signature Wibu CaTool Based on elliptic curve cryptography (ECC) Lead generates the root key and certificate Lead signs certificates for other developers –Signs requests from other developers –Creates signer’s keys and signs certificates Lead sends signed certificates to individual developers
  • 14. 17 | © 2014 Wind River. All Rights Reserved. Security Profile for VxWorks Key Features –Encryption AES encryption Configured from VxWorks Source Build
  • 15. 18 | © 2014 Wind River. All Rights Reserved. Security Profile for VxWorks Key Features –Advanced User Management User database –No default user –Dynamic definition of users –Customizable encryption keys If enabled, all access to target will require a login
  • 16. 19 | © 2014 Wind River. All Rights Reserved. Security Profile for VxWorks Key Features –Encrypted Containers Protect data at rest –Files are encrypted at all times using AES encryption TrueCrypt-compatible containers Can be created on any host platform Can be configured to mount automatically Passphrase encryption can be customized
  • 17. 20 | © 2014 Wind River. All Rights Reserved. Security Profile for VxWorks Enhancement for Security-Critical Applications Software-based security delivered by Security Profile can be reinforced with CodeMeter®hardware-based security by Wibu-Systems. CodeMeter Security adds flexible licensing and hardware binding CodeMeterLicense Central VxWorks 7 Core Platform Security Profile for VxWorks Wibu-Systems Basic Security IP Protection Integrity Protection Wibu-Systems CodeMeter Hardware Protection License Management
  • 18. 21 | © 2014 Wind River. All Rights Reserved. Prevention of operation disruptions, public security risks, and industrial espionage –Hacking, tampering, and unauthorized access to power grid and plant control systems –Piracy, illegal cloning, and code reverse- engineering Protection via: –Encryption –Digital signatures –Advanced user management –Secure remote access –Hardware-based security Security Profile for VxWorks Use Case –Industrial Systems and Energy
  • 19. 22 | © 2014 Wind River. All Rights Reserved. Protection of sensitive data in transit and at rest –Safeguarding patient data (HIPAA) Encryption and user management –Protection of manufacturer-proprietary information stored onboard Encrypted containers Protection from tampering with medical device software –Digital signatures Prevention of piracy and reverse- engineering –Encryption and hardware-based security Security Profile for VxWorks Use Case –Medical Devices
  • 20. 23 | © 2014 Wind River. All Rights Reserved. Hardware-based key store License management New business models Business process integration of license and rights deployment using CodeMeterLicense Central Upgrading to CodeMeterSecurity Additional Opportunities
  • 21. 24 | © 2014 Wind River. All Rights Reserved. Wibu-Systems CodeMeter Dongle Overview ASIC μSD SD Card CF Card USB Dongle Smart card based hardware security Industry compliant hardware Optional SLC flash memory Communication as HID device for USB possible Many Form Factors –One Technology
  • 22. 25 | © 2014 Wind River. All Rights Reserved. Wibu-Systems CmActLicense Software based license Same features as CodeMeter dongles Bound to target system fingerprint
  • 23. 26 | © 2014 Wind River. All Rights Reserved. Wibu-Systems CodeMeter License Central CodeMeter License Central –Design of license models –Creation, delivery and management of licenses Benefits –Cost and time reduction thanks to integration and automation into business processes –Additional revenue streams through flexible licensing models –New customers and new markets Support for CmDonglesand CmActLicenses
  • 24. 27 | © 2014 Wind River. All Rights Reserved. Process Integration Wibu-Systems CodeMeterLicense Central Integration in ERP, CRM, e-shop and customers’ portals Manufacturer User Cloud Ticket / Fingerprint 4 Ticket: ABCDE-FGHIJ-KLMNO-PQRST-UVWXY 3 Update file(License) 5 Ticket 2 SKU 1
  • 25. 28 | © 2014 Wind River. All Rights Reserved. Where to Buy VxWorksSecurity Profile is distributed by Wind River License Central, CmDonglesand CmActLicensesare distributed by Wibu-Systems
  • 26. 29 | © 2014 Wind River. All Rights Reserved. More Information Toll-free: 800-545-WIND (800-545-9463) Toll-free (EMEA): +00-800-4988-4988 www.vxworks.com Wibu-Systems  Germany:+49-721-93172-0  USA:+1-425-775-6900  China:+86-21-5566-1790  www.wibu.com
  • 27. 30 | © 2014 Wind River. All Rights Reserved.