SlideShare a Scribd company logo
IT’S ONLY SMART….. IF IT’S SECURE
AKA
HOW TO CREATE A SECURE IOT DEVICE
MIKE HENDRICK
VP ENGG.
SEQUITUR LABS INC.
2
Kudos!
Copyright Sequitur Labs Inc. 2017
If you are thinking
about IoT security………
…………you are way
ahead of the game
3
• Smart Home
• Smart Building
• Smart Car
• Smart Medical Devices
• Smart Cities
• Smart Grid
• Smart Wearables
Opportunity: Smart Future…….
Copyright Sequitur Labs Inc. 2017
4
Problem: The “Smart” Future ……
Copyright Sequitur Labs Inc. 2017
…….it has it’s own
- Viruses
- Malware
- Hacker community
This lightbulb
is so
“smart”……….
5
Multiple connectivity options
• WiFi
• Bluetooth
• BLE
• Whatever………
“Smart” lightbulbs
Copyright Sequitur Labs Inc. 2017
Connects to your
• WiFi network
• Phone
• Other devices
What does it do?
• It stores your network
credentials
• Knows what devices it should
connect to
6
Hmmmm……So What?
HACKERS CAN USE THIS INFORMATION
TO GET INTO YOUR NETWORK AND
STEAL
• Passwords
• Financial information
• Attack webcams (been there, done that)
• Steal health related information
• Control security systems
Copyright Sequitur Labs Inc. 2017
7
Say it Ain’t So!!
Copyright Sequitur Labs Inc. 2017
A connected lightbulb is a “portal” into
- Your home
- Your life
- Your family
- Your friends
8
Bottom-line: IoT without Security…….
Copyright Sequitur Labs Inc. 2017
….. is like handing over
the keys to your kingdom
9
• Smart Home
• Smart Building
• Smart Car
• Smart Medical Devices
• Smart Cities
• Smart Grid
• Smart Wearables
This Could Happen to ANY Connected Device
in ANY Sector
Copyright Sequitur Labs Inc. 2017
10
HELP!!
Copyright Sequitur Labs Inc. 2017
Where do I start?
• Define the threats
• Design for Security
• Select the right platforms
11
Defining the Threats
Copyright Sequitur Labs Inc. 2017
• Firmware Theft
• Malware
• DDoS Attacks
• Man-in-the-middle
• Physical attacks
• Corrupted firmware
• Compromised peripherals
Devices need protection
throughout their life cycle
• Create
• Operate
• Retire
12
Security Threats Faced by A Device
Copyright Sequitur Labs Inc. 2017
• IP Theft
• Unauthorized manufacture
• Cloning
Create Operate Retire
• Compromised communications
• Compromised upgrades
• Data theft
• Firmware corruption
• Malware
• DDoS
• Data theft
• Stolen network credentials
• IP Theft
• Cloning
Threats
13
Design For Security - Through The Lifecycle
Copyright Sequitur Labs Inc. 2017
• IP Theft
• Unauthorized manufacture
• Cloning
At Manufacture
• Establish hardware root of trust
• Securely inject unique keys and
certs at manufacturing
• Immutable device ID
Threats
Security
Measures
14
Design For Security - Through The Lifecycle
Copyright Sequitur Labs Inc. 2017
• Compromised communications
• Compromised upgrades
• Data theft
• Firmware corruption
• Malware
• DDoS
During Operation
• Trusted boot process
• Hardware based isolation of
critical material
• Payload authentication
• Authenticated communications
• Tamper resistance
• Trusted remediation
Threats
Security
Measures
15
Isolation Technology Example: ARM TrustZone
Copyright Sequitur Labs Inc. 2017
• Secure /Non-Secure States
• Low impact context switch
• Controlled access to
resources
• Crypto resources
• Security applications
• Keys
• Peripherals
16
Design For Security - Through The Lifecycle
Copyright Sequitur Labs Inc. 2017
• Data theft
• Stolen network credentials
• IP Theft
• Cloning
Retiring The Device
• De-authorize devices
• Wipe stored data
• Secure command and control
Threats
Security
Measures
17
Security Through The Device Lifecycle -
Summary
Copyright Sequitur Labs Inc. 2017
• IP Theft
• Unauthorized manufacture
• Cloning
Create Operate Retire
• Compromised communications
• Compromised upgrades
• Data theft
• Firmware corruption
• Malware
• DDoS
• Data theft
• Stolen network credentials
• IP Theft
• Cloning
• Hardware root of trust
• Inject unique keys and
certs at manufacturing
• Immutable device ID
• Trusted boot process
• Hardware based isolation of
critical material
• Payload authentication
• Authenticated communications
• Tamper resistance
• Trusted remediation
• De-authorize devices
• Wipe stored data
Threats
Security
Measures
18
Selecting The Right Platform – From a Security
Perspective
Copyright Sequitur Labs Inc. 2017
• Hardware Platform Considerations
• MCU v/s MPU
• Hardware isolation technologies
• Hardware crypto accelerators, TRNG
• Tamper detection, resistance
• Secure debug capabilities
• Device/Application Use Considerations
• Connectivity/data transmission (example – device pairing, cloud connectivity)
• Peripherals that need security (example – biometric readers)
• Application data that need securing (example – patient info in medical device)
• Application processes that need securing (example – financial transactions)
19
Key Takeaway
Copyright Sequitur Labs Inc. 2017
It’s only
Smart
if it’s
Secure
20
More Stuff Here….
Copyright Sequitur Labs Inc. 2017
• CoreTEE:
http://www.sequiturlabs.com/coretee/coretee-demo/
• CoreLockr-TZ:
http://www.sequiturlabs.com/corelockrtz/corelockr-tz-demo-for-secure-iot/
• End-to-End Security Use Case:
https://youtu.be/C0fCUgBvzDc
• ARM and Sequitur Labs Demonstrate Secure IoT Systems:
http://www.sequiturlabs.com/media_portfolio/arm-sequitur-labs-demonstrate-secure-iot-systems/
• Sequitur Labs Shows Real-World Use of New TrustZone for v8-M Platform:
http://www.sequiturlabs.com/media_portfolio/sequitur-labs-shows-real-world-use-of-new-core-m-platform/
21
Talk To Us.....
Copyright Sequitur Labs Inc. 2017
• We can help.
• We like helping.
• Really.
• Try us out!
www.sequiturlabs.com
info@sequiturlabs.com

More Related Content

PDF
Security in the Internet of Things
PDF
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
PPT
IoT Security – Executing an Effective Security Testing Process
PPTX
Internet of Things Security
PDF
IoT/M2M Security
PPTX
Security Testing for IoT Systems
PPTX
Privacy and Security in the Internet of Things
PPTX
Iot Security, Internet of Things
Security in the Internet of Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
IoT Security – Executing an Effective Security Testing Process
Internet of Things Security
IoT/M2M Security
Security Testing for IoT Systems
Privacy and Security in the Internet of Things
Iot Security, Internet of Things

What's hot (20)

PPTX
Internet of things security challenges
PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPTX
The Internet of Everything is Here
PPTX
IoT security compliance checklist
PPTX
IoT security
PPTX
Security for iot and cloud aug 25b 2017
PPTX
IoT Security: Cases and Methods [CON5446]
PDF
IoT Security, Mirai Revisited
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PDF
Securing the Internet of Things
PDF
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
BSidesHSV 2020 - Keynote - 2030: The Next Decade
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
PPTX
Internet & iot security
PDF
Security challenges for IoT
PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
PPTX
The Insecurity of Industrial Things
PPT
IoT Security by Sanjay Kumar
Internet of things security challenges
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
IoT Security: Debunking the "We Aren't THAT Connected" Myth
The Internet of Everything is Here
IoT security compliance checklist
IoT security
Security for iot and cloud aug 25b 2017
IoT Security: Cases and Methods [CON5446]
IoT Security, Mirai Revisited
Ryan Wilson - ryanwilson.com - IoT Security
Securing the Internet of Things
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
IoT Security, Threats and Challenges By V.P.Prabhakaran
BSidesHSV 2020 - Keynote - 2030: The Next Decade
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Internet & iot security
Security challenges for IoT
2012 12-04 --ncc_group_-_mobile_threat_war_room
The Insecurity of Industrial Things
IoT Security by Sanjay Kumar
Ad

Similar to How to create a secure IoT device (20)

PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PDF
Hack one iot device, break them all!
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PPTX
Security Issues in Internet of Things
PPTX
CS5300 class presentation on managing information systems
PPTX
Why defensive research is sexy too.. … and a real sign of skill
PDF
Creating secure apps using the salesforce mobile sdk
PPTX
Ten security product categories you've (probably) never heard of
PPTX
Securing Your Digital Files from Legal Threats
PPTX
Understanding Zero Trust Security for IBM i
PDF
Better to Ask Permission? Best Practices for Privacy and Security
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPSX
CertainSafe MicroTokenization Technology Detailed Overview
PDF
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
PPTX
AI_Cybersecurity_Expanded_Presentation.pptx
PPTX
What Does a Full Featured Security Strategy Look Like?
PPTX
Fundamental Best Practices in Secure IoT Product Development
PPTX
Application Security within Agile
PDF
Refugees on Rails Berlin - #2 Tech Talk on Security
Track 5 session 1 - st dev con 2016 - need for security for iot
Hack one iot device, break them all!
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
Security Issues in Internet of Things
CS5300 class presentation on managing information systems
Why defensive research is sexy too.. … and a real sign of skill
Creating secure apps using the salesforce mobile sdk
Ten security product categories you've (probably) never heard of
Securing Your Digital Files from Legal Threats
Understanding Zero Trust Security for IBM i
Better to Ask Permission? Best Practices for Privacy and Security
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
CertainSafe MicroTokenization Technology Detailed Overview
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
AI_Cybersecurity_Expanded_Presentation.pptx
What Does a Full Featured Security Strategy Look Like?
Fundamental Best Practices in Secure IoT Product Development
Application Security within Agile
Refugees on Rails Berlin - #2 Tech Talk on Security
Ad

Recently uploaded (20)

PPTX
KVL KCL ppt electrical electronics eee tiet
PPTX
Embedded for Artificial Intelligence 1.pptx
PPTX
Embeded System for Artificial intelligence 2.pptx
PDF
Core Components of IoT, The elements need for IOT
PPTX
udi-benefits-ggggggggfor-healthcare.pptx
PPTX
Operating System Processes_Scheduler OSS
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PPTX
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PDF
PPT Determiners.pdf.......................
PPTX
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
PPTX
ATL_Arduino_Complete_Presentation_AI_Visuals.pptx
PDF
How NGOs Save Costs with Affordable IT Rentals
PPTX
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
PPTX
quadraticequations-111211090004-phpapp02.pptx
PPTX
kvjhvhjvhjhjhjghjghjgjhgjhgjhgjhgjhgjhgjhgjh
PPTX
code of ethics.pptxdvhwbssssSAssscasascc
PPTX
"Fundamentals of Digital Image Processing: A Visual Approach"
PDF
Smarter Security: How Door Access Control Works with Alarms & CCTV
PPTX
sdn_based_controller_for_mobile_network_traffic_management1.pptx
PPTX
executive branch_no record.pptxsvvsgsggs
KVL KCL ppt electrical electronics eee tiet
Embedded for Artificial Intelligence 1.pptx
Embeded System for Artificial intelligence 2.pptx
Core Components of IoT, The elements need for IOT
udi-benefits-ggggggggfor-healthcare.pptx
Operating System Processes_Scheduler OSS
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PPT Determiners.pdf.......................
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
ATL_Arduino_Complete_Presentation_AI_Visuals.pptx
How NGOs Save Costs with Affordable IT Rentals
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
quadraticequations-111211090004-phpapp02.pptx
kvjhvhjvhjhjhjghjghjgjhgjhgjhgjhgjhgjhgjhgjh
code of ethics.pptxdvhwbssssSAssscasascc
"Fundamentals of Digital Image Processing: A Visual Approach"
Smarter Security: How Door Access Control Works with Alarms & CCTV
sdn_based_controller_for_mobile_network_traffic_management1.pptx
executive branch_no record.pptxsvvsgsggs

How to create a secure IoT device

  • 1. IT’S ONLY SMART….. IF IT’S SECURE AKA HOW TO CREATE A SECURE IOT DEVICE MIKE HENDRICK VP ENGG. SEQUITUR LABS INC.
  • 2. 2 Kudos! Copyright Sequitur Labs Inc. 2017 If you are thinking about IoT security……… …………you are way ahead of the game
  • 3. 3 • Smart Home • Smart Building • Smart Car • Smart Medical Devices • Smart Cities • Smart Grid • Smart Wearables Opportunity: Smart Future……. Copyright Sequitur Labs Inc. 2017
  • 4. 4 Problem: The “Smart” Future …… Copyright Sequitur Labs Inc. 2017 …….it has it’s own - Viruses - Malware - Hacker community This lightbulb is so “smart”……….
  • 5. 5 Multiple connectivity options • WiFi • Bluetooth • BLE • Whatever……… “Smart” lightbulbs Copyright Sequitur Labs Inc. 2017 Connects to your • WiFi network • Phone • Other devices What does it do? • It stores your network credentials • Knows what devices it should connect to
  • 6. 6 Hmmmm……So What? HACKERS CAN USE THIS INFORMATION TO GET INTO YOUR NETWORK AND STEAL • Passwords • Financial information • Attack webcams (been there, done that) • Steal health related information • Control security systems Copyright Sequitur Labs Inc. 2017
  • 7. 7 Say it Ain’t So!! Copyright Sequitur Labs Inc. 2017 A connected lightbulb is a “portal” into - Your home - Your life - Your family - Your friends
  • 8. 8 Bottom-line: IoT without Security……. Copyright Sequitur Labs Inc. 2017 ….. is like handing over the keys to your kingdom
  • 9. 9 • Smart Home • Smart Building • Smart Car • Smart Medical Devices • Smart Cities • Smart Grid • Smart Wearables This Could Happen to ANY Connected Device in ANY Sector Copyright Sequitur Labs Inc. 2017
  • 10. 10 HELP!! Copyright Sequitur Labs Inc. 2017 Where do I start? • Define the threats • Design for Security • Select the right platforms
  • 11. 11 Defining the Threats Copyright Sequitur Labs Inc. 2017 • Firmware Theft • Malware • DDoS Attacks • Man-in-the-middle • Physical attacks • Corrupted firmware • Compromised peripherals Devices need protection throughout their life cycle • Create • Operate • Retire
  • 12. 12 Security Threats Faced by A Device Copyright Sequitur Labs Inc. 2017 • IP Theft • Unauthorized manufacture • Cloning Create Operate Retire • Compromised communications • Compromised upgrades • Data theft • Firmware corruption • Malware • DDoS • Data theft • Stolen network credentials • IP Theft • Cloning Threats
  • 13. 13 Design For Security - Through The Lifecycle Copyright Sequitur Labs Inc. 2017 • IP Theft • Unauthorized manufacture • Cloning At Manufacture • Establish hardware root of trust • Securely inject unique keys and certs at manufacturing • Immutable device ID Threats Security Measures
  • 14. 14 Design For Security - Through The Lifecycle Copyright Sequitur Labs Inc. 2017 • Compromised communications • Compromised upgrades • Data theft • Firmware corruption • Malware • DDoS During Operation • Trusted boot process • Hardware based isolation of critical material • Payload authentication • Authenticated communications • Tamper resistance • Trusted remediation Threats Security Measures
  • 15. 15 Isolation Technology Example: ARM TrustZone Copyright Sequitur Labs Inc. 2017 • Secure /Non-Secure States • Low impact context switch • Controlled access to resources • Crypto resources • Security applications • Keys • Peripherals
  • 16. 16 Design For Security - Through The Lifecycle Copyright Sequitur Labs Inc. 2017 • Data theft • Stolen network credentials • IP Theft • Cloning Retiring The Device • De-authorize devices • Wipe stored data • Secure command and control Threats Security Measures
  • 17. 17 Security Through The Device Lifecycle - Summary Copyright Sequitur Labs Inc. 2017 • IP Theft • Unauthorized manufacture • Cloning Create Operate Retire • Compromised communications • Compromised upgrades • Data theft • Firmware corruption • Malware • DDoS • Data theft • Stolen network credentials • IP Theft • Cloning • Hardware root of trust • Inject unique keys and certs at manufacturing • Immutable device ID • Trusted boot process • Hardware based isolation of critical material • Payload authentication • Authenticated communications • Tamper resistance • Trusted remediation • De-authorize devices • Wipe stored data Threats Security Measures
  • 18. 18 Selecting The Right Platform – From a Security Perspective Copyright Sequitur Labs Inc. 2017 • Hardware Platform Considerations • MCU v/s MPU • Hardware isolation technologies • Hardware crypto accelerators, TRNG • Tamper detection, resistance • Secure debug capabilities • Device/Application Use Considerations • Connectivity/data transmission (example – device pairing, cloud connectivity) • Peripherals that need security (example – biometric readers) • Application data that need securing (example – patient info in medical device) • Application processes that need securing (example – financial transactions)
  • 19. 19 Key Takeaway Copyright Sequitur Labs Inc. 2017 It’s only Smart if it’s Secure
  • 20. 20 More Stuff Here…. Copyright Sequitur Labs Inc. 2017 • CoreTEE: http://www.sequiturlabs.com/coretee/coretee-demo/ • CoreLockr-TZ: http://www.sequiturlabs.com/corelockrtz/corelockr-tz-demo-for-secure-iot/ • End-to-End Security Use Case: https://youtu.be/C0fCUgBvzDc • ARM and Sequitur Labs Demonstrate Secure IoT Systems: http://www.sequiturlabs.com/media_portfolio/arm-sequitur-labs-demonstrate-secure-iot-systems/ • Sequitur Labs Shows Real-World Use of New TrustZone for v8-M Platform: http://www.sequiturlabs.com/media_portfolio/sequitur-labs-shows-real-world-use-of-new-core-m-platform/
  • 21. 21 Talk To Us..... Copyright Sequitur Labs Inc. 2017 • We can help. • We like helping. • Really. • Try us out! www.sequiturlabs.com info@sequiturlabs.com