SlideShare a Scribd company logo
1 of 23
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Peter Yang, Sr. Product Manager
June 7th 2017
從雲到端,打造安全的物聯網
Trend Micro IoT Security
趨勢科技
趨勢科技
 Founded in 1989 (28 years), IT security dedicated company
 5,258 employees, cover 30 countries, 60% (3,300+) are engineers
 500,000 enterprise customer and 155 million endpoints globally
 >$1 billion annual sales
 Founded in U.S. Headquartered in Japan
 Tokyo Exchange Nikkei Index (4704) | >$5 billion market cap
 Customers include 45 of top 50 global corporations, and 100% of
the top 10:
Auto Telecom Banks Oil
Gartner Magic Quadrant for
Endpoint Protection Platforms
Feb 2016
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated
in the context of the entire document. The Gartner document is available upon request from
https://resources.trendmicro.com/Gartner-Magic-Quadrant-Endpoints.html
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not
advise technology users to select only those vendors with the highest ratings or other designation. Gartner
research publications consist of the opinions of Gartner's research organization and should not be construed
as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
Trend Micro TippingPoint®
Named a Leader in 2017
Gartner Magic Quadrant for
Intrusion Detection and
Prevention Systems (IDPS)
Jan 2017
重大 IoT 駭客案例回顧
2009 2010 2011 2012 2013 2014 2015 2016
CarShark Software Lets
You Hack Into, Control
And Kill Any Car
Tesla fixes bug
after hackers
hijack Model S
Hackers remotely kill a Jeep
on the highway
• Recall of 1.4M vehicles
• Cost of $140M+
Controlling vehicle features of
Nissan LEAFs across the globe
• Nissan shut down an app
which controls Leaf cars
Hackers take remote
control of Tesla Model S
from 12 miles away
• Push Tesla to provide
new firmware for bug fix
Researchers reveal
methods behind car
hack (2010 Ford Escape)
at Defcon
Hack into the OnStar telematics
system of a 2009 Chevrolet Impala
• GM TOOK 5 YEARS TO FIX FULL
CONTROL HACK IN MILLIONS OF
VEHICLES EQUIPPED WITH ONSTAR
Flaws in 2.2M BMW
ConnectedDrive
Infotainment System
allow remote hack
OnStar hack remotely
starts cars
• GM fix the
RemoteLink App
download 3M+ times
Hackers compromise
Prius, seize control of
wheel, brakes and more
Friendly Hackers
Exploit Loophole to
Disable Alarm on
Mitsubishi Outlander
Car Hacking
IoT DDoS 攻擊事件簿
Dyn
2016/10/21
KrebsOnSecurity
2016/9/20
Jun, 2016
2014
OVH
2016/9/21 Mirai 殭屍
網路程式
碼公開
75萬封垃圾
郵件 (家電)
5萬次/秒
HTTP連線要求
(2萬5千台 CCTV)
620Gbs
DDoS攻擊
(18萬台IoT設備)
14.5萬台IoT設備
發動DDoS攻擊
49.3萬台IoT
發動1.2Tbs
DNS DDoS
IoT 裝置 = 受害者 + 幫凶
問題的根源以及解決方式
IoT 終端裝置的安全考量
雲端終端雲端
IoT 終端裝置威脅來源
• Insecure Design/Code
• Third Party Libraries
• Existing Vulnerabilities
Open Network Ports
(WannaCry)
• Insecure Network Protocols
• Insecure FOTA/SOTA
Poor Authentication/Authorization
(Mirai)
• Undetected File Changes
• Undetected Process Behavior
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
..….............. Retiring
First cycle Second cycle N cycle Last cycle Termination
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
Next Cycle
IoT 終端設備生命週期
IoT 終端設備生命週期及保護
Device is loading up
the firmware and
start to work as it
defined.
1. Boot Up
Boot up completed,
system will read
configuration,
establish connection
or sync up data etc.
2. Initialization
Device performs its
designed purpose
continually.
3. Operation
New firmware
arrived, devices
reboots then start to
load the new
firmware.
4. Update
Next Cycle
(Secure) FOTA
Secure Boot
Firmware Check Reduce the Attack Surface
Health / Risk Check
Block Attack Attempts
Trend Micro FocusPlatform Provider Platform Provider
TMIS
File Integrity &
App
Whitelisting
System
Vulnerability
Self Protection
(Whitelist
lockdown)
Network
Protection
(IPS)
Security
Management
Console
Risk Detection System Protection Incident Response
TMIS
IoT Security
SDK/API
1 2 3
Network
Behavior
Anomaly
Trend Micro IoT Security 功能概述
須於產品開發
階段整合
TMIS 架構及設計理念
Security Service
Security Management
Endpoint SDK/ API
Learning Device
Behavior
Global Threats
Intelligent
Behavior
Baseline
Anomaly
Detection
Engine
Security
Attestation
Logs
Baseline (WL)
Management
Protection Rule
Management
Alert/Report
Responder
Protection
Rule Execution
Behavior
Collector
Feedback
Validate
最小化終端負擔
(運算, 儲存, 耗電…)
最大化雲端效用
(全球威脅搜集,
機器學習,準確性,
即時回應)
全面整合控管
(終端安全管理,
視覺化威脅分析,
SOC整合)
客戶案例分享
使用 TMIS 保護關鍵物聯網終端裝置
CoralEdge Box
利用弱點攻擊
(或是Mirai案例)
入侵 IoT 終端
• 竊取機密監控影片
• 銷毀監控影片
• 癱瘓監視器
• ….
• NAD
• File Integrity
• App WL
Virtual Patch
TMIS
Anomaly Detection
Make sure all IoT devices still work as
originally design.
Vulnerability Detection & Virtual Patch
Understand whether IoT devices were
exposed to the latest threats and take
action to protect them.
Detail the cyber security status of the
firmware.
Find an anomaly of IoT devices, track
trends of the anomaly, and plan the
next fix or take mitigate actions.
TMIS 管理平台
Unusual IP
Unusual Access Timing
Unusual Data Usage
檢視你的 IoT 裝置
Class 1 Class 2 Class 3 Class 4
Control unit MCU (8 bit/16bit) MCU (32bit) MPU (32bit) GPU, MPU, CPU (32bit/64bit)
OS Non Low cost RTOS RTOS/Embedded Linux Embedded Linux/Android/Full
feature RTOS/Win 10 IoT Core
Network ZigBee, NFC, Bluetooth Cellar, Wi-Fi Ethernet, Wi-Fi Wi-Fi with other multiple
network protocols
Application Lighting, Wearables,
Thermostats
Medical devices, low-end
network appliances,
telematics
Larger/ expensive medical
or industrial automation
devices; robotics; vending
machines
Gateways, high-end medical
devices, military devices,
autonomous driving car
IoT Device Security
Root of Trust HW SE (Secure Element) HW/SW PKI HW/SW PKI PKI/TPM
TMIS
(Function)
Risk Detection (Planning) Risk Detection (Planning) Risk Detection/System
Protection
Risk Detection/System
Protection
TMIS (Method) Restful API (Planning) Restful API (Planning) SDK (Agent) SDK (Agent)
OTA/Roll back OTA OTA OTA/Roll back OTA/Roll back
DeviceLifeCycle
IoT 終端裝置分類以及安全防護對策
以 AWS Greengrass 為例
TMIS
Cloud
DATA
+
雲端保護
SecurityIoTProtection
VMEDGE
DEVICES
CLOUDDEVICES
MANAGEMENT
USAGE
ENVIRONMENT
IoT Devices
Security
終端保護
+
Security SecuritySecurity
趨勢科技與AWS打造雲到端的安全物聯網環境
Thank You
Peter_yang@trend.com.tw

More Related Content

What's hot

A Reliable Wafer-Level Chip Scale Package (WLCSP) Technology
A Reliable Wafer-Level Chip Scale Package (WLCSP) TechnologyA Reliable Wafer-Level Chip Scale Package (WLCSP) Technology
A Reliable Wafer-Level Chip Scale Package (WLCSP) Technology
Ozen Engineering, Inc.
 

What's hot (20)

Imaging for Automotive 2019 by Yole Développement
Imaging for Automotive 2019 by Yole DéveloppementImaging for Automotive 2019 by Yole Développement
Imaging for Automotive 2019 by Yole Développement
 
A Reliable Wafer-Level Chip Scale Package (WLCSP) Technology
A Reliable Wafer-Level Chip Scale Package (WLCSP) TechnologyA Reliable Wafer-Level Chip Scale Package (WLCSP) Technology
A Reliable Wafer-Level Chip Scale Package (WLCSP) Technology
 
Status of the Power Module Packaging Industry 2019 - Yole Développement
Status of the Power Module Packaging Industry 2019 - Yole DéveloppementStatus of the Power Module Packaging Industry 2019 - Yole Développement
Status of the Power Module Packaging Industry 2019 - Yole Développement
 
Redfish & python redfish
Redfish & python redfishRedfish & python redfish
Redfish & python redfish
 
NVIDIA A100 ampere GPU
NVIDIA A100 ampere GPUNVIDIA A100 ampere GPU
NVIDIA A100 ampere GPU
 
L3HA-VRRP-20141201
L3HA-VRRP-20141201L3HA-VRRP-20141201
L3HA-VRRP-20141201
 
IIJmio meeting 23 DNSフィルタリングをなぜ行うのか
IIJmio meeting 23 DNSフィルタリングをなぜ行うのかIIJmio meeting 23 DNSフィルタリングをなぜ行うのか
IIJmio meeting 23 DNSフィルタリングをなぜ行うのか
 
EB corbos and the L4Re microhypervisor: Open-source automotive safety
EB corbos and the L4Re microhypervisor: Open-source automotive safetyEB corbos and the L4Re microhypervisor: Open-source automotive safety
EB corbos and the L4Re microhypervisor: Open-source automotive safety
 
hbstudy#88 5G+MEC時代のシステム設計
hbstudy#88 5G+MEC時代のシステム設計hbstudy#88 5G+MEC時代のシステム設計
hbstudy#88 5G+MEC時代のシステム設計
 
IIJmio meeting 17 DSDSと着信シーケンスについて
IIJmio meeting 17 DSDSと着信シーケンスについてIIJmio meeting 17 DSDSと着信シーケンスについて
IIJmio meeting 17 DSDSと着信シーケンスについて
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
閉域網接続の技術入門
閉域網接続の技術入門閉域網接続の技術入門
閉域網接続の技術入門
 
Ethernetの受信処理
Ethernetの受信処理Ethernetの受信処理
Ethernetの受信処理
 
IIJmio meeting 12 災害とMVNO (ETWS動作検証)
IIJmio meeting 12 災害とMVNO (ETWS動作検証)IIJmio meeting 12 災害とMVNO (ETWS動作検証)
IIJmio meeting 12 災害とMVNO (ETWS動作検証)
 
LCA13: Power State Coordination Interface
LCA13: Power State Coordination InterfaceLCA13: Power State Coordination Interface
LCA13: Power State Coordination Interface
 
IIJmio meeting 25 スマートフォンはなぜ「つながらない」のか
IIJmio meeting 25 スマートフォンはなぜ「つながらない」のかIIJmio meeting 25 スマートフォンはなぜ「つながらない」のか
IIJmio meeting 25 スマートフォンはなぜ「つながらない」のか
 
Red Bend Software: Separation Using Type-1 Virtualization in Vehicles and Aut...
Red Bend Software: Separation Using Type-1 Virtualization in Vehicles and Aut...Red Bend Software: Separation Using Type-1 Virtualization in Vehicles and Aut...
Red Bend Software: Separation Using Type-1 Virtualization in Vehicles and Aut...
 
基礎から学ぶ組み込みAndroid
基礎から学ぶ組み込みAndroid基礎から学ぶ組み込みAndroid
基礎から学ぶ組み込みAndroid
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
 

Viewers also liked

Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep Learning
Melanie Swan
 

Viewers also liked (6)

Pancreas Cancer
Pancreas CancerPancreas Cancer
Pancreas Cancer
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
 
全面保護企業的關鍵智慧資產
全面保護企業的關鍵智慧資產全面保護企業的關鍵智慧資產
全面保護企業的關鍵智慧資產
 
Deep Learning - CNN and RNN
Deep Learning - CNN and RNNDeep Learning - CNN and RNN
Deep Learning - CNN and RNN
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep Learning
 
Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017Top 5 Deep Learning and AI Stories - October 6, 2017
Top 5 Deep Learning and AI Stories - October 6, 2017
 

Similar to TrendMicro: 從雲到端,打造安全的物聯網

Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527
August Lin
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 

Similar to TrendMicro: 從雲到端,打造安全的物聯網 (20)

Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527Global IoT Cloud Services Survey-Aug-20160527
Global IoT Cloud Services Survey-Aug-20160527
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
JacksonvilleJUG_CVE101.pdf
JacksonvilleJUG_CVE101.pdfJacksonvilleJUG_CVE101.pdf
JacksonvilleJUG_CVE101.pdf
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

TrendMicro: 從雲到端,打造安全的物聯網

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Peter Yang, Sr. Product Manager June 7th 2017 從雲到端,打造安全的物聯網 Trend Micro IoT Security
  • 3. 趨勢科技  Founded in 1989 (28 years), IT security dedicated company  5,258 employees, cover 30 countries, 60% (3,300+) are engineers  500,000 enterprise customer and 155 million endpoints globally  >$1 billion annual sales  Founded in U.S. Headquartered in Japan  Tokyo Exchange Nikkei Index (4704) | >$5 billion market cap  Customers include 45 of top 50 global corporations, and 100% of the top 10: Auto Telecom Banks Oil
  • 4. Gartner Magic Quadrant for Endpoint Protection Platforms Feb 2016 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https://resources.trendmicro.com/Gartner-Magic-Quadrant-Endpoints.html Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Trend Micro TippingPoint® Named a Leader in 2017 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) Jan 2017
  • 6. 2009 2010 2011 2012 2013 2014 2015 2016 CarShark Software Lets You Hack Into, Control And Kill Any Car Tesla fixes bug after hackers hijack Model S Hackers remotely kill a Jeep on the highway • Recall of 1.4M vehicles • Cost of $140M+ Controlling vehicle features of Nissan LEAFs across the globe • Nissan shut down an app which controls Leaf cars Hackers take remote control of Tesla Model S from 12 miles away • Push Tesla to provide new firmware for bug fix Researchers reveal methods behind car hack (2010 Ford Escape) at Defcon Hack into the OnStar telematics system of a 2009 Chevrolet Impala • GM TOOK 5 YEARS TO FIX FULL CONTROL HACK IN MILLIONS OF VEHICLES EQUIPPED WITH ONSTAR Flaws in 2.2M BMW ConnectedDrive Infotainment System allow remote hack OnStar hack remotely starts cars • GM fix the RemoteLink App download 3M+ times Hackers compromise Prius, seize control of wheel, brakes and more Friendly Hackers Exploit Loophole to Disable Alarm on Mitsubishi Outlander Car Hacking
  • 7. IoT DDoS 攻擊事件簿 Dyn 2016/10/21 KrebsOnSecurity 2016/9/20 Jun, 2016 2014 OVH 2016/9/21 Mirai 殭屍 網路程式 碼公開 75萬封垃圾 郵件 (家電) 5萬次/秒 HTTP連線要求 (2萬5千台 CCTV) 620Gbs DDoS攻擊 (18萬台IoT設備) 14.5萬台IoT設備 發動DDoS攻擊 49.3萬台IoT 發動1.2Tbs DNS DDoS IoT 裝置 = 受害者 + 幫凶
  • 10. IoT 終端裝置威脅來源 • Insecure Design/Code • Third Party Libraries • Existing Vulnerabilities Open Network Ports (WannaCry) • Insecure Network Protocols • Insecure FOTA/SOTA Poor Authentication/Authorization (Mirai) • Undetected File Changes • Undetected Process Behavior
  • 11. Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update ..….............. Retiring First cycle Second cycle N cycle Last cycle Termination Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update Next Cycle IoT 終端設備生命週期
  • 12. IoT 終端設備生命週期及保護 Device is loading up the firmware and start to work as it defined. 1. Boot Up Boot up completed, system will read configuration, establish connection or sync up data etc. 2. Initialization Device performs its designed purpose continually. 3. Operation New firmware arrived, devices reboots then start to load the new firmware. 4. Update Next Cycle (Secure) FOTA Secure Boot Firmware Check Reduce the Attack Surface Health / Risk Check Block Attack Attempts Trend Micro FocusPlatform Provider Platform Provider TMIS
  • 13. File Integrity & App Whitelisting System Vulnerability Self Protection (Whitelist lockdown) Network Protection (IPS) Security Management Console Risk Detection System Protection Incident Response TMIS IoT Security SDK/API 1 2 3 Network Behavior Anomaly Trend Micro IoT Security 功能概述 須於產品開發 階段整合
  • 14. TMIS 架構及設計理念 Security Service Security Management Endpoint SDK/ API Learning Device Behavior Global Threats Intelligent Behavior Baseline Anomaly Detection Engine Security Attestation Logs Baseline (WL) Management Protection Rule Management Alert/Report Responder Protection Rule Execution Behavior Collector Feedback Validate 最小化終端負擔 (運算, 儲存, 耗電…) 最大化雲端效用 (全球威脅搜集, 機器學習,準確性, 即時回應) 全面整合控管 (終端安全管理, 視覺化威脅分析, SOC整合)
  • 16. 使用 TMIS 保護關鍵物聯網終端裝置 CoralEdge Box 利用弱點攻擊 (或是Mirai案例) 入侵 IoT 終端 • 竊取機密監控影片 • 銷毀監控影片 • 癱瘓監視器 • …. • NAD • File Integrity • App WL Virtual Patch TMIS
  • 17. Anomaly Detection Make sure all IoT devices still work as originally design. Vulnerability Detection & Virtual Patch Understand whether IoT devices were exposed to the latest threats and take action to protect them. Detail the cyber security status of the firmware. Find an anomaly of IoT devices, track trends of the anomaly, and plan the next fix or take mitigate actions. TMIS 管理平台
  • 18. Unusual IP Unusual Access Timing Unusual Data Usage
  • 20. Class 1 Class 2 Class 3 Class 4 Control unit MCU (8 bit/16bit) MCU (32bit) MPU (32bit) GPU, MPU, CPU (32bit/64bit) OS Non Low cost RTOS RTOS/Embedded Linux Embedded Linux/Android/Full feature RTOS/Win 10 IoT Core Network ZigBee, NFC, Bluetooth Cellar, Wi-Fi Ethernet, Wi-Fi Wi-Fi with other multiple network protocols Application Lighting, Wearables, Thermostats Medical devices, low-end network appliances, telematics Larger/ expensive medical or industrial automation devices; robotics; vending machines Gateways, high-end medical devices, military devices, autonomous driving car IoT Device Security Root of Trust HW SE (Secure Element) HW/SW PKI HW/SW PKI PKI/TPM TMIS (Function) Risk Detection (Planning) Risk Detection (Planning) Risk Detection/System Protection Risk Detection/System Protection TMIS (Method) Restful API (Planning) Restful API (Planning) SDK (Agent) SDK (Agent) OTA/Roll back OTA OTA OTA/Roll back OTA/Roll back DeviceLifeCycle IoT 終端裝置分類以及安全防護對策
  • 21. 以 AWS Greengrass 為例 TMIS