SlideShare a Scribd company logo
Why the IoT Needs Upgradable Security
L A R S LY D E R S E N , S E N I O R D I R E C T O R O F P R O D U C T S E C U R I T Y
Why the IoT Needs Upgradable Security
L A R S LY D E R S E N , S E N I O R D I R E C T O R O F P R O D U C T S E C U R I T Y
Meet Lars, the Quantum Hacker
IoT of Guns
Smart Engineers What you see You aimed
here
The gun
shot here
4
Don’t Break My Heart
5
Classical Cyber Security
Proprietary
6
IoT Security
Proprietary
/
 Increased attack
surface
 Accessibility to
hardware
 Limited
processing power
in end nodes
7
 Security/privacy
 Easy of use
 Functionality
 Cost
Security/privacy is a balancing act
8
Class
Hobbyist /
script-kiddie
Advanced
hackers
Security researchers Nation state attacks
Motivation Fun, curiosity, fame Fame, financial
Curiosity, improve
security, novel ideas
and attacks
Espionage, sabotage
Resources
Limited, commodity
hacking equipment
Semi-specialized
equipment. Experts in
single domain
Ultra-specialized
equipment. Experts in
multiple domains
Unlimited
Exponentially increasing cost of security
Who is the adversary? Why do they attack?
9
Commoditization of attacker tools: DPA
Before ca. 1998
Nation state?
No public knowledge
about DPA?
Ca. 1998 – ca. 2015
Cryptographic Research, now Rambus,
publishes papers on DPA and starts selling
DPA equipment at a prohibitive price
Security researchers
2015 - now
Chipwisperer on Kickstarter
for $300. Analysis software
on Github
Hobbyists
10
DPA today
11
Commoditization of attacker tools: EMI
2017 - now?
Nation state?
No public knowledge
about EMI?
? –2017
Risecure sells EM Probe
stations at a prohibitive price
Security researchers
Someone made a $350 probe
station from a 3D printer and
will put it on github (Badfet)
Hobbyists
12
EMI today
13
What is the right security level?
Time
Level of security
Adversary strength
Today End of life for device
 Adversary strengthens
 Always new, novel attacks
 Must upgrade security during lifecycle
 Not all attacks are patchable
 Need strong HW security today
Choice of
security
level
14
Who is the adversary of 2035?
15
Secure boot is needed to enable upgradability
 Signatures verify authenticity
 Must use asymmetric crypto
 Only requires public keys in the device
 May provide confidentiality
 Difficult find loopholes in image
 Protect IP
 Must put keys in immutable memory
16
M E M O R Y R E Q U I R E M E N T S
How much overhead do you need?
How to manage the memory budget?
H O W
Directly connected?
Forced updates?
W H O
Who is authorized to push updates?
How is the authorization enforced?
Deploying upgrades
Memory
Bootloader RTOS Com Stack
App data Overhead
17
 Security is not binary
 Consider the adversary of the future
 Upgradable security is necessary in IoT
Summary
18
Thank you!

More Related Content

PPTX
Python-Assisted Red-Teaming Operation
PPTX
Berkarir di Cyber Security
PDF
Security for Human Beings
PDF
SACON - Deception Technology (Sahir Hidayatullah)
PPTX
The value of Deep Instinct’s prediction model – Copy Cat Test Case
PPTX
Crowd-Sourced Threat Intelligence
PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PPTX
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Python-Assisted Red-Teaming Operation
Berkarir di Cyber Security
Security for Human Beings
SACON - Deception Technology (Sahir Hidayatullah)
The value of Deep Instinct’s prediction model – Copy Cat Test Case
Crowd-Sourced Threat Intelligence
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016

What's hot (20)

PPTX
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
PPTX
How to assign a CVE to yourself?
PDF
Threat Deception - Counter Techniques from the Defenders League
PDF
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
PPTX
Ethical Hacking
PDF
IoT Attack Surfaces -- DEFCON 2015
PDF
ISACA Ethical Hacking Presentation 10/2011
PPTX
Android Hacking + Pentesting
PPTX
Extracting the Malware Signal from Internet Noise
PPTX
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
PDF
IoT security zigbee -- Null Meet bangalore
PDF
PSCR 2019 - ICAM Standards
PPTX
Practical hardware attacks against SOHO Routers & the Internet of Things
PPT
Mobile phone Data Hacking
PPTX
CyberCamp 2015: Low Hanging Fruit
PDF
RSA2015: Securing the Internet of Things
PPTX
Information security
PPT
Why Risk Management is Impossible
PPTX
Security and privacy for journalists
PDF
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
How to assign a CVE to yourself?
Threat Deception - Counter Techniques from the Defenders League
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Ethical Hacking
IoT Attack Surfaces -- DEFCON 2015
ISACA Ethical Hacking Presentation 10/2011
Android Hacking + Pentesting
Extracting the Malware Signal from Internet Noise
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
IoT security zigbee -- Null Meet bangalore
PSCR 2019 - ICAM Standards
Practical hardware attacks against SOHO Routers & the Internet of Things
Mobile phone Data Hacking
CyberCamp 2015: Low Hanging Fruit
RSA2015: Securing the Internet of Things
Information security
Why Risk Management is Impossible
Security and privacy for journalists
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
Ad

Similar to Why the IoT the Needs Upgradable Security (20)

PDF
Hack one iot device, break them all!
PPSX
Ethical Hacking, Its relevance and Its Prospects
PPTX
ShadyRAT: Anatomy of targeted attack
PPTX
CrowdSec A-Round Fundraising Deck
PPTX
Digital Age-Preparing Yourself
PDF
Hacking Internet of Things (IoT)
PPTX
How to Build a Career in Cyber Security?
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PPTX
Cyber Security: A Common Problem 2018
PDF
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
PDF
Ethical Hacking by Krutarth Vasavada
PPTX
Io t slides_iotvillage
PPTX
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
PDF
From Identity to Ownership Theft
PDF
Tower defense for hackers: Layered (in-)security for microcontrollers
PPTX
SAMBA - Luka Pavol - 12.3.2014
PPTX
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
PDF
Best Endpoint Security Course with AI in Delhi.pdf
PDF
Network security
PDF
Blue team reboot - HackFest
Hack one iot device, break them all!
Ethical Hacking, Its relevance and Its Prospects
ShadyRAT: Anatomy of targeted attack
CrowdSec A-Round Fundraising Deck
Digital Age-Preparing Yourself
Hacking Internet of Things (IoT)
How to Build a Career in Cyber Security?
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Cyber Security: A Common Problem 2018
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Ethical Hacking by Krutarth Vasavada
Io t slides_iotvillage
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
From Identity to Ownership Theft
Tower defense for hackers: Layered (in-)security for microcontrollers
SAMBA - Luka Pavol - 12.3.2014
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Best Endpoint Security Course with AI in Delhi.pdf
Network security
Blue team reboot - HackFest
Ad

More from Silicon Labs (20)

PDF
Develop Secure, Interoperable Smart Home Products with Z-Wave
PDF
Benchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance
PDF
Enhance Home and Building Automation with Multiprotocol Wireless Connectivity
PDF
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...
PDF
Extending Bluetooth with Mesh Networking
PDF
Selecting the Right Mesh Technology for Your Application
PDF
Getting the Most Out of Bluetooth 5
PDF
Developing Accessories for the Apple HomeKit Ecosystem
PDF
Developing Biomedical Devices with Bluetooth
PDF
Integrating Speed and Flexibility Isolating Industrial Control
PDF
Clock Tree Timing 101
PDF
Building a More Connected World
PDF
Applications and Industries Being Powered by Bluetooth Low Energy
PDF
Choosing Between a Wireless Module and a Wireless SoC
PDF
Multiprotocol Wireless Gecko SoCs
PPTX
Multi-mode Wireless SoCs
PPTX
Router CPU Load in Home Networks
PDF
Aiming Low: Low-Power MCUs for the IoT
PDF
Step Right Up: Design the Next Winning Wearable
PPTX
Top Lessons Learned: Industrial Automation Webinar Series
Develop Secure, Interoperable Smart Home Products with Z-Wave
Benchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance
Enhance Home and Building Automation with Multiprotocol Wireless Connectivity
5 Clock Tree Design Techniques to Optimize SerDes Performance for Networking ...
Extending Bluetooth with Mesh Networking
Selecting the Right Mesh Technology for Your Application
Getting the Most Out of Bluetooth 5
Developing Accessories for the Apple HomeKit Ecosystem
Developing Biomedical Devices with Bluetooth
Integrating Speed and Flexibility Isolating Industrial Control
Clock Tree Timing 101
Building a More Connected World
Applications and Industries Being Powered by Bluetooth Low Energy
Choosing Between a Wireless Module and a Wireless SoC
Multiprotocol Wireless Gecko SoCs
Multi-mode Wireless SoCs
Router CPU Load in Home Networks
Aiming Low: Low-Power MCUs for the IoT
Step Right Up: Design the Next Winning Wearable
Top Lessons Learned: Industrial Automation Webinar Series

Recently uploaded (20)

PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
1. Introduction to Computer Programming.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Web App vs Mobile App What Should You Build First.pdf
Mushroom cultivation and it's methods.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TLE Review Electricity (Electricity).pptx
Hindi spoken digit analysis for native and non-native speakers
OMC Textile Division Presentation 2021.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Approach and Philosophy of On baking technology
1. Introduction to Computer Programming.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Tartificialntelligence_presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
A comparative study of natural language inference in Swahili using monolingua...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
NewMind AI Weekly Chronicles - August'25-Week II

Why the IoT the Needs Upgradable Security

  • 1. Why the IoT Needs Upgradable Security L A R S LY D E R S E N , S E N I O R D I R E C T O R O F P R O D U C T S E C U R I T Y
  • 2. Why the IoT Needs Upgradable Security L A R S LY D E R S E N , S E N I O R D I R E C T O R O F P R O D U C T S E C U R I T Y
  • 3. Meet Lars, the Quantum Hacker
  • 4. IoT of Guns Smart Engineers What you see You aimed here The gun shot here 4
  • 7. IoT Security Proprietary /  Increased attack surface  Accessibility to hardware  Limited processing power in end nodes 7
  • 8.  Security/privacy  Easy of use  Functionality  Cost Security/privacy is a balancing act 8
  • 9. Class Hobbyist / script-kiddie Advanced hackers Security researchers Nation state attacks Motivation Fun, curiosity, fame Fame, financial Curiosity, improve security, novel ideas and attacks Espionage, sabotage Resources Limited, commodity hacking equipment Semi-specialized equipment. Experts in single domain Ultra-specialized equipment. Experts in multiple domains Unlimited Exponentially increasing cost of security Who is the adversary? Why do they attack? 9
  • 10. Commoditization of attacker tools: DPA Before ca. 1998 Nation state? No public knowledge about DPA? Ca. 1998 – ca. 2015 Cryptographic Research, now Rambus, publishes papers on DPA and starts selling DPA equipment at a prohibitive price Security researchers 2015 - now Chipwisperer on Kickstarter for $300. Analysis software on Github Hobbyists 10
  • 12. Commoditization of attacker tools: EMI 2017 - now? Nation state? No public knowledge about EMI? ? –2017 Risecure sells EM Probe stations at a prohibitive price Security researchers Someone made a $350 probe station from a 3D printer and will put it on github (Badfet) Hobbyists 12
  • 14. What is the right security level? Time Level of security Adversary strength Today End of life for device  Adversary strengthens  Always new, novel attacks  Must upgrade security during lifecycle  Not all attacks are patchable  Need strong HW security today Choice of security level 14
  • 15. Who is the adversary of 2035? 15
  • 16. Secure boot is needed to enable upgradability  Signatures verify authenticity  Must use asymmetric crypto  Only requires public keys in the device  May provide confidentiality  Difficult find loopholes in image  Protect IP  Must put keys in immutable memory 16
  • 17. M E M O R Y R E Q U I R E M E N T S How much overhead do you need? How to manage the memory budget? H O W Directly connected? Forced updates? W H O Who is authorized to push updates? How is the authorization enforced? Deploying upgrades Memory Bootloader RTOS Com Stack App data Overhead 17
  • 18.  Security is not binary  Consider the adversary of the future  Upgradable security is necessary in IoT Summary 18