Right-sized Security for IoT
Mike Eftimakis
IoT Product Manager, ARM
Case study – Tape-out a secure IoT chip in 3 months!
Selecting the “Right Size” for IoT security
HW Attacks
 Physical access to device – JTAG, Bus, IO Pins
 Well resourced and funded
 Time, money & equipmentSoftware Attacks
 Buffer overflows
 Interrupts
 Malware
Communication Attacks
 Man In The Middle
 Weak RNG
 Code vulnerabilities
Cost/Effort
To Attack
Cost/Effort to
Secure
Non scalable
IoT
Subsystem
for Cortex-M
eFlash
Interconnect
Flash Cache
eFlash
Flash Cntl
SRAM
Controller
APB
PeripheralsSRAMSRAMSRAMSRAM
ProcessorCortex-M
CoreSightSoC
mbed OS
Device Drivers
Application
Beetle
Test chip
Power
Management
TRNG
APB
Bridge
Cordio
Radio
ARM® mbed™ OS
(including mbedTLS, mbed uVisor)
TRNG
(from ARM TrustZone® CryptoCell)
ARM IoT Subsystem
for Cortex®-M
ARM Cortex-M3
ARM Cordio® Radio
 Device management
 Support for bootstrapping /
provisioning / refurbishing /
decommissioning
 Behaviour monitoring
 Device integrity
 Protect from untrusted software
 Allow recovery from attack
 Asset protection
 Prevent access to certain
resources
 Data Security
 Keep data confidential
 Prevent data alteration
 Physical Security
 Anti-tampering protection
 Future-proofing
 Keep firmware up-to-date
Device security
Communications security
Lifecycle security
 Link encryption
 Prevent eavesdroppers to listen
 Authentication
 Guarantee identity of endpoint / server
 Anonymity/Confidentiality
 Keep identity unknown to eavesdroppers
 Prevent traceability
Implement
OMA LWM2M
ImplementTLS
Root of Trust +
Chain ofTrust
HW backed
partitioning
(MPU)
Implement Dual
Flash bank +
Secure FoTA
HW backed
partitioning
(MPU)
Partition SW
Resource
IoT
node Cloud
Disrupt device
Observe / corrupt
data
Access protected
network
Damage cost = value of lost data
or side information (presence…)
Damage cost = value of lost cloud data
or value of the network infrastructure
Damage cost = value of disabled node
or value of lost node data
× Scale
of network!!!
Estimate threats for your application
“Security” has different meanings
Device management
Support for bootstrapping / provisioning /
refurbishing / decommissioning
Behaviour monitoring
Device integrity
Protect from untrusted software
Allow recovery from attack
Asset protection
Prevent access to certain
resources
Data Security
Keep data confidential
Prevent data alteration
Physical Security
Anti-tampering protection
Future-proofing
Keep firmware up-to-date
Device security
Communications security
Lifecycle security
Link encryption
Prevent eavesdroppers to listen
Authentication
Guarantee identity of endpoint / server
Anonymity/Confidentiality
Keep identity unknown to eavesdroppers
Prevent traceability
Select the
“right-sized” security!
 Security is expensive
 Need to understand the threats
 Use threat model adapted to IoT

More Related Content

PPTX
Hardware Security
PPTX
Hardware security
PPTX
Presentation1 new (1) (1)cf
PDF
Hardware, and Trust Security: Explain it like I’m 5!
PPT
Introduction Network security
PDF
Computer Security Lecture 1: Overview
PPTX
Network Security
PPTX
Network security
Hardware Security
Hardware security
Presentation1 new (1) (1)cf
Hardware, and Trust Security: Explain it like I’m 5!
Introduction Network security
Computer Security Lecture 1: Overview
Network Security
Network security

What's hot (20)

PDF
Cyber tooth briefing
PPTX
Network security
PPTX
Network security and firewalls
DOCX
Hardwar based Security of Systems
PDF
Network Security Fundamentals
PPTX
Network Security
PPT
Cryptppt1
PPT
Information System Security introduction
DOCX
Network security
PPTX
Chapter 1: Overview of Network Security
PPTX
Network security
PDF
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
PPTX
Modern Network Security Issue and Challenge
PDF
Firewall
PDF
Network Security Certification
PPTX
Ethical hacking ppt
PPTX
What is network security and Types
PPTX
Network Security ppt
PDF
IoT security-arrow-roadshow #iotconfua
Cyber tooth briefing
Network security
Network security and firewalls
Hardwar based Security of Systems
Network Security Fundamentals
Network Security
Cryptppt1
Information System Security introduction
Network security
Chapter 1: Overview of Network Security
Network security
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
Modern Network Security Issue and Challenge
Firewall
Network Security Certification
Ethical hacking ppt
What is network security and Types
Network Security ppt
IoT security-arrow-roadshow #iotconfua
Ad

Viewers also liked (11)

PDF
Using the Joomla Framework for Internet of Things (IoT) Case for Lighting Con...
PPTX
GSMA Final Project by Denson Ngumo
PPTX
How telecom industry realte with IoT as a new area of business- TDC a case study
PPTX
Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016
PPTX
Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...
PDF
Case Study: IoT industry applied to the production of Peruvian native potatoes
PDF
Mobile + Cloud + IoT - Case Study
PDF
Iot, cloud and healthcare - Challenges and Opportunities
PPTX
The Internet of Cars - Towards the Future of the Connected Car
PPTX
IoT in Healthcare
PDF
An Introduction to IoT: Connectivity & Case Studies
Using the Joomla Framework for Internet of Things (IoT) Case for Lighting Con...
GSMA Final Project by Denson Ngumo
How telecom industry realte with IoT as a new area of business- TDC a case study
Jaakko Kankaanpää - IoT Took My Money - Mindtrek 2016
Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...
Case Study: IoT industry applied to the production of Peruvian native potatoes
Mobile + Cloud + IoT - Case Study
Iot, cloud and healthcare - Challenges and Opportunities
The Internet of Cars - Towards the Future of the Connected Car
IoT in Healthcare
An Introduction to IoT: Connectivity & Case Studies
Ad

Similar to Right-sized security for IoT - ARM (20)

PPTX
Network and Security-2.pptx
PDF
IoT summit - Building flexible & secure IoT solutions
PPT
Computersystemssecurity 090529105555-phpapp01
PPT
Computer Systems Security
PPT
Wireless Device and Network level security
PPTX
Automotive security (cvta)
PDF
Building Trust Despite Digital Personal Devices
PPT
Chapter14 -- networking security
PPT
S T M U T M
PPTX
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
PPTX
Seminar (network security)
PDF
BKK16-200 Designing Security into low cost IO T Systems
PPT
謝續平
PPTX
Safe and secure autonomous systems
PPTX
Internet of things security "Hardware Security"
PDF
R U aBLE? BLE Application Hacking
PPTX
Corporate Security Issues and countering them using Unified Threat Management...
PPTX
Removing Security Roadblocks to IoT Deployment Success
DOCX
Wireless Security and Mobile DevicesChapter 12Princi.docx
PDF
Network Security - Defense Through Layered Information Security
Network and Security-2.pptx
IoT summit - Building flexible & secure IoT solutions
Computersystemssecurity 090529105555-phpapp01
Computer Systems Security
Wireless Device and Network level security
Automotive security (cvta)
Building Trust Despite Digital Personal Devices
Chapter14 -- networking security
S T M U T M
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Seminar (network security)
BKK16-200 Designing Security into low cost IO T Systems
謝續平
Safe and secure autonomous systems
Internet of things security "Hardware Security"
R U aBLE? BLE Application Hacking
Corporate Security Issues and countering them using Unified Threat Management...
Removing Security Roadblocks to IoT Deployment Success
Wireless Security and Mobile DevicesChapter 12Princi.docx
Network Security - Defense Through Layered Information Security

Recently uploaded (20)

DOCX
search engine optimization ppt fir known well about this
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Architecture types and enterprise applications.pdf
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Modernising the Digital Integration Hub
PPTX
The various Industrial Revolutions .pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
CloudStack 4.21: First Look Webinar slides
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
search engine optimization ppt fir known well about this
Taming the Chaos: How to Turn Unstructured Data into Decisions
Microsoft Excel 365/2024 Beginner's training
Consumable AI The What, Why & How for Small Teams.pdf
1 - Historical Antecedents, Social Consideration.pdf
The influence of sentiment analysis in enhancing early warning system model f...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
UiPath Agentic Automation session 1: RPA to Agents
Architecture types and enterprise applications.pdf
Flame analysis and combustion estimation using large language and vision assi...
Modernising the Digital Integration Hub
The various Industrial Revolutions .pptx
Enhancing emotion recognition model for a student engagement use case through...
OpenACC and Open Hackathons Monthly Highlights July 2025
sustainability-14-14877-v2.pddhzftheheeeee
CloudStack 4.21: First Look Webinar slides
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx

Right-sized security for IoT - ARM

  • 1. Right-sized Security for IoT Mike Eftimakis IoT Product Manager, ARM Case study – Tape-out a secure IoT chip in 3 months! Selecting the “Right Size” for IoT security HW Attacks  Physical access to device – JTAG, Bus, IO Pins  Well resourced and funded  Time, money & equipmentSoftware Attacks  Buffer overflows  Interrupts  Malware Communication Attacks  Man In The Middle  Weak RNG  Code vulnerabilities Cost/Effort To Attack Cost/Effort to Secure Non scalable IoT Subsystem for Cortex-M eFlash Interconnect Flash Cache eFlash Flash Cntl SRAM Controller APB PeripheralsSRAMSRAMSRAMSRAM ProcessorCortex-M CoreSightSoC mbed OS Device Drivers Application Beetle Test chip Power Management TRNG APB Bridge Cordio Radio ARM® mbed™ OS (including mbedTLS, mbed uVisor) TRNG (from ARM TrustZone® CryptoCell) ARM IoT Subsystem for Cortex®-M ARM Cortex-M3 ARM Cordio® Radio  Device management  Support for bootstrapping / provisioning / refurbishing / decommissioning  Behaviour monitoring  Device integrity  Protect from untrusted software  Allow recovery from attack  Asset protection  Prevent access to certain resources  Data Security  Keep data confidential  Prevent data alteration  Physical Security  Anti-tampering protection  Future-proofing  Keep firmware up-to-date Device security Communications security Lifecycle security  Link encryption  Prevent eavesdroppers to listen  Authentication  Guarantee identity of endpoint / server  Anonymity/Confidentiality  Keep identity unknown to eavesdroppers  Prevent traceability Implement OMA LWM2M ImplementTLS Root of Trust + Chain ofTrust HW backed partitioning (MPU) Implement Dual Flash bank + Secure FoTA HW backed partitioning (MPU) Partition SW Resource IoT node Cloud Disrupt device Observe / corrupt data Access protected network Damage cost = value of lost data or side information (presence…) Damage cost = value of lost cloud data or value of the network infrastructure Damage cost = value of disabled node or value of lost node data × Scale of network!!! Estimate threats for your application “Security” has different meanings Device management Support for bootstrapping / provisioning / refurbishing / decommissioning Behaviour monitoring Device integrity Protect from untrusted software Allow recovery from attack Asset protection Prevent access to certain resources Data Security Keep data confidential Prevent data alteration Physical Security Anti-tampering protection Future-proofing Keep firmware up-to-date Device security Communications security Lifecycle security Link encryption Prevent eavesdroppers to listen Authentication Guarantee identity of endpoint / server Anonymity/Confidentiality Keep identity unknown to eavesdroppers Prevent traceability Select the “right-sized” security!  Security is expensive  Need to understand the threats  Use threat model adapted to IoT