28
©2018 Trusted Computing Group The Future of Trusted Computing Steve Hanna Co-Chair, Embedded Systems Work Group, TCG Senior Principal, Infineon Technologies 1

The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

The Future of Trusted

Computing

Steve Hanna

Co-Chair, Embedded Systems Work Group, TCG

Senior Principal, Infineon Technologies

1

Page 2: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

Agenda

• TCG Vision

• Today’s Reality

• Securing IoT and Cloud

• Conclusion

• Questions and Discussion

2

Page 3: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

TCG VISION

3

Page 4: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

TCG Vision“TCG Enabled” internationally

standardized technology is globally accepted and expected

as the foundation for trustin systems ranging from the most

complex large-scale computing platforms to small scale dedicated devices, from traditional IT to the factory floor to the myriad devices

which enrich our daily lives

4

Page 5: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

“TCG-Enabled” Technology

• TPM (Trusted Platform Module)

• DICE (Device Identifier Composition Engine)

• SED (Self-Encrypting Drives)

• TNC (Trusted Network Communications)

5

Page 6: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

SED Overview

1. Initial Boot

2. Pre-Boot OS

3. User Authentication

4. Boot into Normal OS

5. Normal operation, with inline hardware encryption

6

Page 7: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

TNC Overview

7

Page 8: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

TODAY’S REALITY

8

Page 9: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

X

✓X

9

Page 10: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

TEE – Trusted Execution Environment

10

Graphics Source: UL; White paper - HCE security implications, analyzing the security aspects of HCE (Jan 8, 2014)

Page 11: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

IoT Attacks Growing

11

Page 12: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

SECURING IOT AND CLOUD

12

Page 13: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

IoT Defined

"A world where physical objects are seamlessly integrated into the information network."

13

Page 14: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

Why IoT?Smart HomeAutomotive Industrial ICT

Greater efficiency2

Increased flexibility and customization3

New capabilities and services1

14

Page 15: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

IoT Affects Everything

Factory Automation

Smart Vehicles

Smart Cars

Commercial, Agri-culture & Construc-tion Vehicles incl. Trucks & Busses

Low speed vehicles

Smart Cities & EnergySmart Industry &

Business

Smartphones, Tablets & PCs

Consumer Electronics & Wearables

Smart Home

Smart Home & Consumer Devices

Other Business

Other Transport

Energy

Building Automation

Professional Lighting

Infrastructure

Data Center / CloudCommunication Networks

Smart ICT

Medical Equipment

15

Page 16: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

IoT ArchitectureGather data

AnalyzeSend commands

Reliably convey data and commands

Send and receive data and commands

16

Page 17: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

Each layer can be attackedSecurity threats for IoT

An Eavesdropper listening in on data or commands can reveal confidential information about the operation of the infrastructure.

A Bad Deviceinjecting fake measurements can disrupt the control processes and cause them to react inappropriately or dangerously, or can be used to mask physical attacks.

A Bad Serversending incorrect commands can be used to trigger unplanned events, to send some physical resource (water, oil, electricity, etc.) to an unplanned destina-tion, and so forth.

Bad Server

Bad Device

17

Page 18: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

Source: Gartner survey results, March 3, 2016http://www.gartner.com/newsroom/id/3236718

Top challenges for IoT adopters

1 Cybersecurity

2 Integration

3 Managing business requirements

18

Page 19: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

TCG Work on Securing IoT

• Published

– TCG Guidance for Securing IoT

– Automotive-Thin Profile for TPM

– DICE Architectures

• In Progress

– TCG Guidance for Securing Industrial Systems

– Cyber Resilient Technologies19

Page 20: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

TCG Guidance for Securing IoT

20

Page 21: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

Automotive-Thin Profile for TPM

21

Head Unit / Gateway

HW

4 Core < RAM

OS

Others

Applications

TPM

Head Unit / Gateway

HW

1~2 core RAM

OS

Others

Applications

TPM

ECU

HW

1 core RAM

Others

Application

TPM

ECU

HW

1 core RAM

Others

Application

TPM

ECU

HW

1 core RAM

Others

Application

TPM

More resources,

Auto-Rich

Limited resources,

Auto-Thin

Page 22: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

DICE Architectures

22

DICE Engine

Layer 0 Layer 1 Layer nPower

On Unique Device Secret

Secret 0 Secret 1 Secret n

Layer 1’ Layer n’

Secret 1’ Secret n’

Page 23: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

Work in Progress

23

TCG Guidance for Securing Industrial Systems Cyber Resilient Technologies

• Protect updatable persistent code and configuration data

• Detect when vulnerabilities are not patched or when corruption has occurred

• Recover reliably to a known good state even if the platform is compromised

Page 24: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

TCG Work on Securing Cloud

• Published

– Trusted Multi-Tenant Infrastructure Trust Assessment Framework

– Trusted Multi-Tenant Infrastructure Use Cases

– Trusted Multi-Tenant Infrastructure Reference Framework

24

Page 25: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

Trusted Multi-Tenant Infrastructure

25

Page 26: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

CONCLUSION

26

Page 27: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

What Lies Ahead?

• New applications for Trusted Computing

• New challenges and threats

• New ideas for addressing those threats

27

Page 28: The Future of Trusted Computing...©2018 Trusted Computing Group Each layer can be attacked Security threats for IoT An Eavesdropper listening in on data or commands can reveal confidential

©2018 Trusted Computing Group

QUESTIONS AND DISCUSSION

28