SlideShare a Scribd company logo
Firm w are Encry ption and S ecure Rem ote Update




          .
www.aisec.fraunhofer.de
The Problem                    Firmware Encryption and Secure Remote Update




    Unprotected firmware can be copied,
     analyzed and modified
    In-System interfaces allow access to the
     device firmware




www.aisec.fraunhofer.de
Solution                      Firmware Encryption and Secure Remote Update




    Encryption prevents reverse engineering of
     firmware code
    Obfuscation makes runtime analysis of
     firmware difficult
    Memory protection mechanisms prevent
     access to stored firmware




www.aisec.fraunhofer.de
Solution                           Firmware Encryption and Secure Remote Update



Production (initial setup)            Field Service
                                  (firmware update)
               Crypto Parameter

Boot Loader



               Encryption &
                                            Flash Tool
                Flash Tool


Firmware




          .
www.aisec.fraunhofer.de
Our Offerings                 Firmware Encryption and Secure Remote Update



    Tools for firmware encryption
    Implementation of authentication and
     obfuscation mechanisms
    Development and integration of firmware
     decryption in the boot loader
    Optimal use of available security features
     on system platforms




www.aisec.fraunhofer.de
Your Benefit                 Firmware Encryption and Secure Remote Update




    Protection of firmware against reverse
     engineering
    Prevention of product piracy
    Seamless integration of modern encryption
     and decryption methods




www.aisec.fraunhofer.de

More Related Content

PDF
The Future Mobile Security
PPTX
Sequrity policy
PPT
Network security 22.1.18
PDF
The People Terminating Unit
PDF
PPT
Security Measures
PDF
Mobile Security Qualcom mr. patrick tsie - qualcomm
PDF
Preventing Stealthy Threats with Next Generation Endpoint Security
The Future Mobile Security
Sequrity policy
Network security 22.1.18
The People Terminating Unit
Security Measures
Mobile Security Qualcom mr. patrick tsie - qualcomm
Preventing Stealthy Threats with Next Generation Endpoint Security

What's hot (20)

PDF
OPERATING SYSTEM SECURITY
PDF
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
PDF
Protection Service for Business
PPTX
Symantec Endpoint Protection
PPTX
Windows Defense101
PPTX
ME Information Security
PDF
How Endpoint Security works ?
PPTX
Operating system security
PDF
Operating systems security 2007 vulnerability report
PPTX
Bootkits step by-step-slides-final-v1-release
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PDF
Understanding and Protecting Ourselves from Buggy Device Drivers
PPTX
Security in Windows operating system
PPT
Operating system vulnerability and control
PPTX
Moodle security
PPT
WE16 - Defense in Depth: Top 10 Critical Security Controls
PDF
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
PPT
OS Security 2009
PDF
StandGuard Anti-Virus Tech Pack
PDF
Cybercrime & Business. Jak wygrać tę wojnę?
OPERATING SYSTEM SECURITY
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Protection Service for Business
Symantec Endpoint Protection
Windows Defense101
ME Information Security
How Endpoint Security works ?
Operating system security
Operating systems security 2007 vulnerability report
Bootkits step by-step-slides-final-v1-release
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Understanding and Protecting Ourselves from Buggy Device Drivers
Security in Windows operating system
Operating system vulnerability and control
Moodle security
WE16 - Defense in Depth: Top 10 Critical Security Controls
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
OS Security 2009
StandGuard Anti-Virus Tech Pack
Cybercrime & Business. Jak wygrać tę wojnę?
Ad

Similar to Firmware Encryption and Secure Remote Update (20)

PDF
Using fault injection attacks for digital forensics
PPTX
bh-JP-04-grand_6afsdjlfakjslajsflöafjlsaj.pptx
PDF
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
PDF
Tower defense for hackers: Layered (in-)security for microcontrollers
PDF
Wrapped rsa cryptography check on window
PDF
Bypassing Secure Boot using Fault Injection
PDF
Product Protection
PDF
IRJET- Enhanced SIT Algorithm for Embedded Systems
PDF
Track 5 session 2 - st dev con 2016 - security iot best practices
PDF
Beginners guide on how to start exploring IoT 2nd session
PPTX
Firmware analysis 101
PPTX
Safe and secure programming practices for embedded devices
PDF
publication
PDF
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
PDF
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
PPT
Embabded system security for feuture .ppt
PDF
Can Firmware Malware Be Removed - SafeAeon
PPT
PDF
PEW PEW PEW: Designing Secure Boot Securely
PDF
PEW PEW PEW: Designing Secure Boot Securely
Using fault injection attacks for digital forensics
bh-JP-04-grand_6afsdjlfakjslajsflöafjlsaj.pptx
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
Tower defense for hackers: Layered (in-)security for microcontrollers
Wrapped rsa cryptography check on window
Bypassing Secure Boot using Fault Injection
Product Protection
IRJET- Enhanced SIT Algorithm for Embedded Systems
Track 5 session 2 - st dev con 2016 - security iot best practices
Beginners guide on how to start exploring IoT 2nd session
Firmware analysis 101
Safe and secure programming practices for embedded devices
publication
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
Embabded system security for feuture .ppt
Can Firmware Malware Be Removed - SafeAeon
PEW PEW PEW: Designing Secure Boot Securely
PEW PEW PEW: Designing Secure Boot Securely
Ad

More from Fraunhofer AISEC (20)

PDF
Fraunhofer Magazin weiter.vorn
PDF
Internet of (Every)Thing
PDF
App Ray: 10000 Apps
PDF
Produktschutz-Technologien für elektronische Geräte
PDF
Cyber-Sicherheit - Newsletter 2013
PDF
Native Code Execution Control for Attack Mitigation on Android
PDF
An Antivirus API for Android Malware Recognition
PDF
Marktchancen mit IT-Sicherheit
PDF
Cybersecurity 2013 - Design for Security
PDF
Sicherheitsgipfel - Chancen und Risiken der IT
PDF
Tech Report: On the Effectiveness of Malware Protection on Android
PDF
PEP - Protecting Electronic Products
PDF
Infografik Produktschutz
PDF
Cyber Security aus Sicht der Wissenschaft
PDF
Produktschutz Infografik
PDF
IKT-Trends und deren Bedeutung für eHealth
PDF
Innovation braucht Sicherheit - Sicherheit braucht Forschung
PDF
Alan Turing
PDF
Sicherheit im Smart Grid
PDF
40 Jahre Informatik Hamburg
Fraunhofer Magazin weiter.vorn
Internet of (Every)Thing
App Ray: 10000 Apps
Produktschutz-Technologien für elektronische Geräte
Cyber-Sicherheit - Newsletter 2013
Native Code Execution Control for Attack Mitigation on Android
An Antivirus API for Android Malware Recognition
Marktchancen mit IT-Sicherheit
Cybersecurity 2013 - Design for Security
Sicherheitsgipfel - Chancen und Risiken der IT
Tech Report: On the Effectiveness of Malware Protection on Android
PEP - Protecting Electronic Products
Infografik Produktschutz
Cyber Security aus Sicht der Wissenschaft
Produktschutz Infografik
IKT-Trends und deren Bedeutung für eHealth
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Alan Turing
Sicherheit im Smart Grid
40 Jahre Informatik Hamburg

Firmware Encryption and Secure Remote Update

  • 1. Firm w are Encry ption and S ecure Rem ote Update . www.aisec.fraunhofer.de
  • 2. The Problem Firmware Encryption and Secure Remote Update  Unprotected firmware can be copied, analyzed and modified  In-System interfaces allow access to the device firmware www.aisec.fraunhofer.de
  • 3. Solution Firmware Encryption and Secure Remote Update  Encryption prevents reverse engineering of firmware code  Obfuscation makes runtime analysis of firmware difficult  Memory protection mechanisms prevent access to stored firmware www.aisec.fraunhofer.de
  • 4. Solution Firmware Encryption and Secure Remote Update Production (initial setup) Field Service (firmware update) Crypto Parameter Boot Loader Encryption & Flash Tool Flash Tool Firmware . www.aisec.fraunhofer.de
  • 5. Our Offerings Firmware Encryption and Secure Remote Update  Tools for firmware encryption  Implementation of authentication and obfuscation mechanisms  Development and integration of firmware decryption in the boot loader  Optimal use of available security features on system platforms www.aisec.fraunhofer.de
  • 6. Your Benefit Firmware Encryption and Secure Remote Update  Protection of firmware against reverse engineering  Prevention of product piracy  Seamless integration of modern encryption and decryption methods www.aisec.fraunhofer.de