SlideShare a Scribd company logo
2
Most read
4
Most read
- 1 -
Mobile & Embedded System Lab.
Dept. of Computer Engineering
Kyung Hee Univ.
SCC
(Security Control Center)
Presented by Junyoung Jung
Capstone Design Ⅱ
- 2 - Kyung Hee University
Mobile Embedded System Lab.
Contents
 Motivation
 Related works
 Proposed System
 SCC: Security Control Center
 Demonstration
- 3 - Kyung Hee University
Mobile Embedded System Lab.
Motivation
 Recent Trends
 Accelerated the launch of a variety of IoT products & services
 Increased interest in IoT device security issues
 Problems
 Manufactured without considering security level
 Absence of a security control system
▶ Difficult to respond to security attacks
Need for a Security Control System
(Collecting and Analyzing the information about security attacks.)
- 4 - Kyung Hee University
Mobile Embedded System Lab.
Related works
 SecurePi: Secure Raspberry Pi (Using TPM*)
 Linux based high-end secure COTS IoT device platform
① Secure Key Storage & Management
② Secure Boot
③ Secure Firmware Update
④ Remote Attestation
⑤ Secure Communication
⑥ Mandatory Access Control
⑦ Filesystem Integrity
⑧ Filesystem Encryption
*TPM : Trusted Platform Module
- 5 - Kyung Hee University
Mobile Embedded System Lab.
Related works
 SArduino: Secure Arduino (Using SE*)
 RTOS/Firmware based Low-end secure COTS IoT device platform
① Secure Key Storage & Management
② Secure Boot
③ Secure Firmware Update
④ Remote Attestation
⑤ Secure Communication
*SE : Secure Elements
- 6 - Kyung Hee University
Mobile Embedded System Lab.
Proposed System
 Functional requirements (for performing Security Controls)
① Ensure availability of sensitive data
▶ Storing and managing the encryption key data in TPM/SE
▶ Secure Key Storage & Management Monitoring
② Ensure F/W integrity (Secure Boot)
▶ Firmware replacement attacks prevention
▶ Secure Boot Monitoring
③ Ensure secure F/W update
▶ The previous versions of firmware install prevention
▶ Secure Firmware Update Monitoring
- 7 - Kyung Hee University
Mobile Embedded System Lab.
Proposed System
 Functional requirements (for performing Security Controls)
④ Ensure F/W integrity (Remote Attestation)
▶ Firmware replacement attacks prevention through other device
▶ Remote Attestation Monitoring
⑤ Detect the device login attempt
▶ Checking the login log(/var/log/auth.log) periodically
▶ Login Monitoring
⑥ Detect the device allow/deny packet
▶ Checking the iptables log periodically
▶ Packet Monitoring
- 8 - Kyung Hee University
Mobile Embedded System Lab.
SCC: Security Control Center
 System Architecture
IoT Control Platform
SSL
Administrator
Web browser HTTP
SCC-Server
SCC-Web Database
JSON
On-demand Event
Secure Pi
SCC-Client
SecureKeyManagement
Monitor
Front-end
Back-end
EJS
Node.js
.css .js
express
AJAX
Transaction
Upload the SCC-Client Info. to Database
Remote Attestation Server
Firmware Update Server
Secure Boot
Monitor
SecureFWUpdate
Monitor
RemoteAttestation
Monitor
Login Monitor Packet Monitor
SCC table
LOG table
…
- 9 - Kyung Hee University
Mobile Embedded System Lab.
Demonstration
 http://163.180.118.193:3000
① Device registration
② Device detail view
③ Device Firmware Update
• Secure Key Storage & Management
• Secure Boot
• Secure Firmware Update
• Remote Attestation
④ Login & Packet Monitoring
- 10 - Kyung Hee University
Mobile Embedded System Lab.
Thank you

More Related Content

PDF
[Kcc poster] 정준영
PPTX
SecureIoT MVI use case pitch presentation
PPTX
Security in an embedded system
PDF
Nist 800 82 ICS Security Auditing Framework
PPTX
Safe and secure autonomous systems
PPTX
ME Information Security
PPTX
Data/File Security & Control
PDF
IoT security-arrow-roadshow #iotconfua
[Kcc poster] 정준영
SecureIoT MVI use case pitch presentation
Security in an embedded system
Nist 800 82 ICS Security Auditing Framework
Safe and secure autonomous systems
ME Information Security
Data/File Security & Control
IoT security-arrow-roadshow #iotconfua

What's hot (20)

PPTX
Ics presentation
PDF
Cybersecurity in Industrial Control Systems (ICS)
PDF
Hardware, and Trust Security: Explain it like I’m 5!
PDF
Guide scada and_industrial_control_systems_security
PDF
Info and telecom_network_security
PDF
Securing SCADA
PDF
The journey to ICS - Extended
PDF
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
PPT
Security technologies
PDF
Dmitry Kurbatov. Five Nightmares for a Telecom
PPTX
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
PPTX
ICS Security 101 by Sandeep Singh
PPTX
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
PDF
Industrial Control System Security Overview
PDF
Android device protection
PPTX
The Truth About Viruses on IBM i
PPTX
Scada security presentation by Stephen Miller
PDF
Best Practices in IBM i Security
PPTX
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
PPTX
IBM i Security Best Practices
Ics presentation
Cybersecurity in Industrial Control Systems (ICS)
Hardware, and Trust Security: Explain it like I’m 5!
Guide scada and_industrial_control_systems_security
Info and telecom_network_security
Securing SCADA
The journey to ICS - Extended
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Security technologies
Dmitry Kurbatov. Five Nightmares for a Telecom
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
ICS Security 101 by Sandeep Singh
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Industrial Control System Security Overview
Android device protection
The Truth About Viruses on IBM i
Scada security presentation by Stephen Miller
Best Practices in IBM i Security
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
IBM i Security Best Practices
Ad

Similar to SCC (Security Control Center) (20)

PDF
[KCC oral] 정준영
PDF
Security for Connected Vehicle: Successes and Challenges
PDF
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
PDF
Security framework for connected devices
DOCX
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
PPTX
501 ch 5 securing hosts and data
PPTX
Internet of things security "Hardware Security"
PPTX
Reconfigurable trust forembeddedcomputingplatforms
PPTX
seminar.pptx
PPTX
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
PPTX
Security in embedded systems
PDF
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
PDF
Tower defense for hackers: Layered (in-)security for microcontrollers
PDF
Track 5 session 4 - st dev con 2016 - life cycle management for web
PPT
TRUSTSeminar.ppt
PPTX
PPTX
Project_updated
PDF
Linux Kernel Security Overview - KCA 2009
PDF
Security issues in FPGA based systems.
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
[KCC oral] 정준영
Security for Connected Vehicle: Successes and Challenges
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
Security framework for connected devices
SIMPLIFIED SECURED WIRELESS RAILWAY / AIRWAY FOR RESERVATION
501 ch 5 securing hosts and data
Internet of things security "Hardware Security"
Reconfigurable trust forembeddedcomputingplatforms
seminar.pptx
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Security in embedded systems
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Tower defense for hackers: Layered (in-)security for microcontrollers
Track 5 session 4 - st dev con 2016 - life cycle management for web
TRUSTSeminar.ppt
Project_updated
Linux Kernel Security Overview - KCA 2009
Security issues in FPGA based systems.
Track 5 session 1 - st dev con 2016 - need for security for iot
Ad

More from Junyoung Jung (20)

PDF
전자석을 이용한 타자 연습기
PDF
[2018 평창올림픽 기념 SW 공모전] Nolza 보고서
PDF
[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service
PDF
Google File System
PDF
sauber92's Potfolio (ver.2012~2017)
PDF
Electron을 사용해서 Arduino 제어하기
PDF
[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스
PDF
[우아주, Etc] 정준영 - 페이시스템
PDF
[우아주, 7월] 정준영
PDF
[team608] 전자석을 이용한 타자연습기
PDF
[Graduation Project] 전자석을 이용한 타자 연습기
PDF
[KCC poster]정준영
PDF
16 학술제 마무리 자료
PDF
[Maybee] inSpot
PDF
[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt
PDF
[2016 K-global 스마트디바이스톤] inSpot
PDF
[2015전자과공모전] ppt
PDF
[C++]6 function2
PDF
[C++]5 function
PDF
[C++]4 review
전자석을 이용한 타자 연습기
[2018 평창올림픽 기념 SW 공모전] Nolza 보고서
[2018 평창올림픽 기념 SW 공모전] Nolza - Activity curation service
Google File System
sauber92's Potfolio (ver.2012~2017)
Electron을 사용해서 Arduino 제어하기
[UNITHON 5TH] KOK - 프로귀찮러를 위한 지출관리 서비스
[우아주, Etc] 정준영 - 페이시스템
[우아주, 7월] 정준영
[team608] 전자석을 이용한 타자연습기
[Graduation Project] 전자석을 이용한 타자 연습기
[KCC poster]정준영
16 학술제 마무리 자료
[Maybee] inSpot
[대학생 연합 해커톤 UNITHON 3RD] Mingginyu_ppt
[2016 K-global 스마트디바이스톤] inSpot
[2015전자과공모전] ppt
[C++]6 function2
[C++]5 function
[C++]4 review

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Tartificialntelligence_presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
1. Introduction to Computer Programming.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25-Week II
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Assigned Numbers - 2025 - Bluetooth® Document
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
Tartificialntelligence_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A comparative analysis of optical character recognition models for extracting...
The Rise and Fall of 3GPP – Time for a Sabbatical?
1. Introduction to Computer Programming.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology

SCC (Security Control Center)

  • 1. - 1 - Mobile & Embedded System Lab. Dept. of Computer Engineering Kyung Hee Univ. SCC (Security Control Center) Presented by Junyoung Jung Capstone Design Ⅱ
  • 2. - 2 - Kyung Hee University Mobile Embedded System Lab. Contents  Motivation  Related works  Proposed System  SCC: Security Control Center  Demonstration
  • 3. - 3 - Kyung Hee University Mobile Embedded System Lab. Motivation  Recent Trends  Accelerated the launch of a variety of IoT products & services  Increased interest in IoT device security issues  Problems  Manufactured without considering security level  Absence of a security control system ▶ Difficult to respond to security attacks Need for a Security Control System (Collecting and Analyzing the information about security attacks.)
  • 4. - 4 - Kyung Hee University Mobile Embedded System Lab. Related works  SecurePi: Secure Raspberry Pi (Using TPM*)  Linux based high-end secure COTS IoT device platform ① Secure Key Storage & Management ② Secure Boot ③ Secure Firmware Update ④ Remote Attestation ⑤ Secure Communication ⑥ Mandatory Access Control ⑦ Filesystem Integrity ⑧ Filesystem Encryption *TPM : Trusted Platform Module
  • 5. - 5 - Kyung Hee University Mobile Embedded System Lab. Related works  SArduino: Secure Arduino (Using SE*)  RTOS/Firmware based Low-end secure COTS IoT device platform ① Secure Key Storage & Management ② Secure Boot ③ Secure Firmware Update ④ Remote Attestation ⑤ Secure Communication *SE : Secure Elements
  • 6. - 6 - Kyung Hee University Mobile Embedded System Lab. Proposed System  Functional requirements (for performing Security Controls) ① Ensure availability of sensitive data ▶ Storing and managing the encryption key data in TPM/SE ▶ Secure Key Storage & Management Monitoring ② Ensure F/W integrity (Secure Boot) ▶ Firmware replacement attacks prevention ▶ Secure Boot Monitoring ③ Ensure secure F/W update ▶ The previous versions of firmware install prevention ▶ Secure Firmware Update Monitoring
  • 7. - 7 - Kyung Hee University Mobile Embedded System Lab. Proposed System  Functional requirements (for performing Security Controls) ④ Ensure F/W integrity (Remote Attestation) ▶ Firmware replacement attacks prevention through other device ▶ Remote Attestation Monitoring ⑤ Detect the device login attempt ▶ Checking the login log(/var/log/auth.log) periodically ▶ Login Monitoring ⑥ Detect the device allow/deny packet ▶ Checking the iptables log periodically ▶ Packet Monitoring
  • 8. - 8 - Kyung Hee University Mobile Embedded System Lab. SCC: Security Control Center  System Architecture IoT Control Platform SSL Administrator Web browser HTTP SCC-Server SCC-Web Database JSON On-demand Event Secure Pi SCC-Client SecureKeyManagement Monitor Front-end Back-end EJS Node.js .css .js express AJAX Transaction Upload the SCC-Client Info. to Database Remote Attestation Server Firmware Update Server Secure Boot Monitor SecureFWUpdate Monitor RemoteAttestation Monitor Login Monitor Packet Monitor SCC table LOG table …
  • 9. - 9 - Kyung Hee University Mobile Embedded System Lab. Demonstration  http://163.180.118.193:3000 ① Device registration ② Device detail view ③ Device Firmware Update • Secure Key Storage & Management • Secure Boot • Secure Firmware Update • Remote Attestation ④ Login & Packet Monitoring
  • 10. - 10 - Kyung Hee University Mobile Embedded System Lab. Thank you