SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Open / Non-NDA v 33 slide # 1 Kinzinger Automation GmbH
Klaus Kinzinger, kinzinger@kinzinger.de
Joint European
Security Initiative
M2M Summit in Cologne, 11th October 2017
Open / Non-NDA v 33 slide # 2 Kinzinger Automation GmbH
A non-NDA Teaser
Open / Non-NDA v 33 slide # 3 Kinzinger Automation GmbH
Intro
There exists a clean solution
for the problem of cybersecurity. It is
straightforward, clear,
complete, formally provable and thus
qualifies for certification according
to the highest IT security standards
JESI SCCT will supply this solution to the IoT,
Industry 4.0 and critical infrastructures market.
This technology will be used by everyone who
builds mission critical systems of any kind.
Open / Non-NDA v 33 slide # 4 Kinzinger Automation GmbH
Objectives
General purpose, fully scalable processor IP with
1. Certified and reliable cybersecurity
(task level security features guaranteed by HW)
2. Certified and reliable safety / protection of
control flow – CFI (programs cannot crash)
memory access (smart pointers in HW)
3. Superior energy efficiency and performance
Open / Non-NDA v 33 slide # 5 Kinzinger Automation GmbH
Basics
IT security is an architectural feature and no add-on.
One can not mount or reliably glue it onto hardware
that by design has no support for it (von Neumann)
A major technology leap is needed that ought to
start with critical infrastructures and then should
expand into the mass markets
For economic reasons, in the mass markets
energy efficiency is paramount for success
Open / Non-NDA v 33 slide # 6 Kinzinger Automation GmbH
Chain of Trust ?
IT security can not exist
without proper hardware anchoring
It never has and never will
Open / Non-NDA v 33 slide # 7 Kinzinger Automation GmbH
Von Neumann Architecture – Benefits
1945 – unlimited software freedom (one task at a time):
code ≡ data => self-modifying code
unified memory => random code/data memory access
=
?
VNA in 1945 – EDVAC VNA in 2017 – Intel Chip
?
Open / Non-NDA v 33 slide # 8 Kinzinger Automation GmbH
Von Neumann Architecture – Hazards
2017 – unlimited malware freedom (multitasking, internet):
code ≡ data => code injection, arbitrary code exec
unified memory => computer espionage / sabotage etc.
=
?
VNA in 1945 – EDVAC VNA in 2017 – Intel Chip
?
Open / Non-NDA v 33 slide # 9 Kinzinger Automation GmbH
Exploit of a SW Bug
Attacker triggers SW crash
ChainofTrust
Layer
Layer
Layer
Layer
Exploit bypasses
the whole software stack
(and any "chain of trust")
Control flow is hijacked
and directed to machine code
injected or selected (ROP)
by the attacker
Technology Stack
Cyber attack
classic
von Neumann CPU
(no security)
OS: Tasks, MMU
ISA
(HW/SW Interface)
Application Attacker takes over control
At ISA level, the system
is unguarded and an easy prey
Open / Non-NDA v 33 slide # 10 Kinzinger Automation GmbH
Cyberdefense – Option 1 – Quality Assurance
no bug no hack
"Security by bug-free coding"
(a popular illusion)
"Security by bug-fix"
(hopeless, e.g. Microsoft)
"Security by hunting malware"
(hopeless, e.g. Symantec)
Prevent the attack
Technology Stack
Cyber attack
classic
von Neumann CPU
(no security)
OS: Tasks, MMU
ISA
(HW/SW Interface)
Application
ChainofTrust
Layer
Layer
Layer
Layer
Open / Non-NDA v 33 slide # 11 Kinzinger Automation GmbH
Cyberdefense – Option 2 – VNA Tuning
HW options are restricted by
legacy code compatibility needs
... good concept, but
ChainofTrust
Layer
Layer
Layer
Layer
Technology Stack
Cyber attack
tuned
von Neumann CPU
(some security)
OS: Tasks, MMU
ISA
(HW/SW Interface)
Application
Guard the impact point
"Security by NX-Bit"
(only partial solution)
"Security by Stack Canaries"
(only partial solution)
"Security by Shadow Stack"
(CET - Wintel's new idea,
again: partial solution)
Open / Non-NDA v 33 slide # 12 Kinzinger Automation GmbH
Cyberdefense – Option 3 – Secure ISA
Technology Stack
VISA
(HW/SW Interface)
Cybersecure Virtual ISA
butterfly CPU
(full security)
Layer
Layer
OS: Tasks, MMU
Cyber attack
Application
ChainofTrust
Layer
Withdraw all computer
linguistic means needed to
program / perform the attack
at machine code level
Layer
Open / Non-NDA v 33 slide # 13 Kinzinger Automation GmbH
Joint European
Security Initiative
Open / Non-NDA v 33 slide # 14 Kinzinger Automation GmbH
Mission – European Secure ICT Standard
JESI develops a new cybersecure processor type
Based on a solid theoretical framework, its novel computing
core IP, OS components, algorithms, and communication
protocols define a future European Secure ICT Standard
providing reliable cybersecurity against
all kinds of malware, ransomware, viruses, worms,
and Trojan horses that exploit coding errors, and
most types of backdoors and key escrow implanted
into SW or HW by non-EU manufacturers
Open / Non-NDA v 33 slide # 15 Kinzinger Automation GmbH
Main Use Cases
Based on the results of the JESI foundation project
SCCT – Secure Computing Core Technology – three
JESI subprojects implement use cases of primary interest
SVCT Secure Vehicular Communications Technology
(networked environments in car / train / aircraft,
and in stationary communications infrastructures)
SIAT Secure Industrial Automation Technology
(Industry 4.0, IoT, "secure PLC" and so on)
SHPC Secure High Performance Computing
(data center & cloud computing)
Open / Non-NDA v 33 slide # 16 Kinzinger Automation GmbH
Timeline
Cybersecurity at highest JESI level is urgently
needed to protect people, nations, and industries
around the world from the impact of cyber espionage,
sabotage, warfare, and terrorism. It is also vital for
future digitalisation projects like Industry 4.0 and IoT
JESI is therefore planned to deliver ASAP
April, 2018 – submission to Horizon 2020
September/October 2018 – Project start
30 Months – Duration. Results: prototypes
Open / Non-NDA v 33 slide # 17 Kinzinger Automation GmbH
Partner per type per country per subproject
AKKA IND SVCT Kinzinger SME SCCT Ficosa IND SVCT
Bertrandt IND SVCT/SHPC FZI RTO SCCT Innovalia RTO SVCT
CEA RTO SVCT TUD Uni SCCT Eneo SME SVCT
INRIA RTO SVCT KIT Uni SIAT Nextel SME SVCT
ESIEE Uni SVCT HAW Uni SCCT SQS SME SVCT
Eurecom RTO SVCT Ikusi SME SVCT
Montimage SME SVCT UAB Uni SCCT/SHPC
Quirinus SME SVCT/SHPC
YoGoKo SME SVCT
SW Mobile SME SVCT
F-AR RTO SIAT
IMEC RTO SCCT JKU Uni SCCT
KU Leuven Uni SCCT Beia SME SVCT Yagoba SME SCCT
Germany
South Korea
Romania
Austria
SpainFrance
Belgium
Open / Non-NDA v 33 slide # 18 Kinzinger Automation GmbH
Benefits for JESI Industry Partners
JESI is bound to cause a major disruption
of all mission critical ICT markets because ...
ICT operators in critical application domains will run
legal liability risks in case of damage or casualties
caused by standard insecure ICT – as soon as secure
solutions are available on the market they may be held
legally accountable for not using them
For JESI industry partners, this additional legal aspect
is a winning game. They will be first in the evolving high
security ICT market and benefit from more than two years
technology lead in the SVCT, SIAT, and SHPC domains
Open / Non-NDA v 33 slide # 19 Kinzinger Automation GmbH
Call for Industry Partners
LE partners with the following profiles / roles are sought:
Automotive, train, avionics manufacturers
or their component suppliers, e.g. SEAT, Bosch,
Thales, Airbus
Industrial automation suppliers with specific interest
in Industry 4.0 and IoT, e.g. Siemens, Bosch, ABB
Industry partners looking for strategic investment
into an European ARM-like technology IP provider

Mais conteúdo relacionado

Mais procurados

SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...Nabil Bouzerna
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateSODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateNabil Bouzerna
 
Highly customizable video surveillance platform for manufactures and system ...
Highly customizable  video surveillance platform for manufactures and system ...Highly customizable  video surveillance platform for manufactures and system ...
Highly customizable video surveillance platform for manufactures and system ...Nikolai Ptitsyn
 
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...Nabil Bouzerna
 
Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...Nabil Bouzerna
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_webLorenzo Beccacece
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon LibraryFortinet
 
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...Nabil Bouzerna
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?Alan Tatourian
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustTalea Consulting Srl
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesteam-WIBU
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
mbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connectormbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connectorarmmbed
 

Mais procurados (20)

SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateSODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
 
Highly customizable video surveillance platform for manufactures and system ...
Highly customizable  video surveillance platform for manufactures and system ...Highly customizable  video surveillance platform for manufactures and system ...
Highly customizable video surveillance platform for manufactures and system ...
 
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
 
Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_web
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
mbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connectormbed Connect Asia 2016 Overview of mbed Device Connector
mbed Connect Asia 2016 Overview of mbed Device Connector
 

Semelhante a Secure Computing Core Technology - A non-NDA Teaser

Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-enVahid RG-zadeh
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackersteam-WIBU
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-howteam-WIBU
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System SecurityAdel Barkam
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgL. Duke Golden
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure CybersecurityLogitek Solutions
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemmbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemarmmbed
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 
Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of ThingsIRJET Journal
 
IRJET- Cyber Attacks on Smart Cars using SDR
IRJET-  	  Cyber Attacks on Smart Cars using SDRIRJET-  	  Cyber Attacks on Smart Cars using SDR
IRJET- Cyber Attacks on Smart Cars using SDRIRJET Journal
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Advanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationAdvanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationInfineon Technologies AG
 

Semelhante a Secure Computing Core Technology - A non-NDA Teaser (20)

Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackers
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemmbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of Things
 
IRJET- Cyber Attacks on Smart Cars using SDR
IRJET-  	  Cyber Attacks on Smart Cars using SDRIRJET-  	  Cyber Attacks on Smart Cars using SDR
IRJET- Cyber Attacks on Smart Cars using SDR
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Advanced and Low-Complexity Authentication
Advanced and Low-Complexity AuthenticationAdvanced and Low-Complexity Authentication
Advanced and Low-Complexity Authentication
 

Mais de M2M Alliance e.V.

Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0M2M Alliance e.V.
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - OverviewM2M Alliance e.V.
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentM2M Alliance e.V.
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...M2M Alliance e.V.
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System M2M Alliance e.V.
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsM2M Alliance e.V.
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business AdvantageM2M Alliance e.V.
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology M2M Alliance e.V.
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingM2M Alliance e.V.
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living M2M Alliance e.V.
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation M2M Alliance e.V.
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...M2M Alliance e.V.
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsM2M Alliance e.V.
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesM2M Alliance e.V.
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteM2M Alliance e.V.
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthM2M Alliance e.V.
 

Mais de M2M Alliance e.V. (20)

M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
 
Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - Overview
 
VR Industry Solutions
VR Industry Solutions VR Industry Solutions
VR Industry Solutions
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M Environment
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory Applications
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business Advantage
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device Hacking
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of Things
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future Revenues
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from Remote
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential Growth
 
Vodafone Internet of Things
Vodafone Internet of ThingsVodafone Internet of Things
Vodafone Internet of Things
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Secure Computing Core Technology - A non-NDA Teaser

  • 1. Open / Non-NDA v 33 slide # 1 Kinzinger Automation GmbH Klaus Kinzinger, kinzinger@kinzinger.de Joint European Security Initiative M2M Summit in Cologne, 11th October 2017
  • 2. Open / Non-NDA v 33 slide # 2 Kinzinger Automation GmbH A non-NDA Teaser
  • 3. Open / Non-NDA v 33 slide # 3 Kinzinger Automation GmbH Intro There exists a clean solution for the problem of cybersecurity. It is straightforward, clear, complete, formally provable and thus qualifies for certification according to the highest IT security standards JESI SCCT will supply this solution to the IoT, Industry 4.0 and critical infrastructures market. This technology will be used by everyone who builds mission critical systems of any kind.
  • 4. Open / Non-NDA v 33 slide # 4 Kinzinger Automation GmbH Objectives General purpose, fully scalable processor IP with 1. Certified and reliable cybersecurity (task level security features guaranteed by HW) 2. Certified and reliable safety / protection of control flow – CFI (programs cannot crash) memory access (smart pointers in HW) 3. Superior energy efficiency and performance
  • 5. Open / Non-NDA v 33 slide # 5 Kinzinger Automation GmbH Basics IT security is an architectural feature and no add-on. One can not mount or reliably glue it onto hardware that by design has no support for it (von Neumann) A major technology leap is needed that ought to start with critical infrastructures and then should expand into the mass markets For economic reasons, in the mass markets energy efficiency is paramount for success
  • 6. Open / Non-NDA v 33 slide # 6 Kinzinger Automation GmbH Chain of Trust ? IT security can not exist without proper hardware anchoring It never has and never will
  • 7. Open / Non-NDA v 33 slide # 7 Kinzinger Automation GmbH Von Neumann Architecture – Benefits 1945 – unlimited software freedom (one task at a time): code ≡ data => self-modifying code unified memory => random code/data memory access = ? VNA in 1945 – EDVAC VNA in 2017 – Intel Chip ?
  • 8. Open / Non-NDA v 33 slide # 8 Kinzinger Automation GmbH Von Neumann Architecture – Hazards 2017 – unlimited malware freedom (multitasking, internet): code ≡ data => code injection, arbitrary code exec unified memory => computer espionage / sabotage etc. = ? VNA in 1945 – EDVAC VNA in 2017 – Intel Chip ?
  • 9. Open / Non-NDA v 33 slide # 9 Kinzinger Automation GmbH Exploit of a SW Bug Attacker triggers SW crash ChainofTrust Layer Layer Layer Layer Exploit bypasses the whole software stack (and any "chain of trust") Control flow is hijacked and directed to machine code injected or selected (ROP) by the attacker Technology Stack Cyber attack classic von Neumann CPU (no security) OS: Tasks, MMU ISA (HW/SW Interface) Application Attacker takes over control At ISA level, the system is unguarded and an easy prey
  • 10. Open / Non-NDA v 33 slide # 10 Kinzinger Automation GmbH Cyberdefense – Option 1 – Quality Assurance no bug no hack "Security by bug-free coding" (a popular illusion) "Security by bug-fix" (hopeless, e.g. Microsoft) "Security by hunting malware" (hopeless, e.g. Symantec) Prevent the attack Technology Stack Cyber attack classic von Neumann CPU (no security) OS: Tasks, MMU ISA (HW/SW Interface) Application ChainofTrust Layer Layer Layer Layer
  • 11. Open / Non-NDA v 33 slide # 11 Kinzinger Automation GmbH Cyberdefense – Option 2 – VNA Tuning HW options are restricted by legacy code compatibility needs ... good concept, but ChainofTrust Layer Layer Layer Layer Technology Stack Cyber attack tuned von Neumann CPU (some security) OS: Tasks, MMU ISA (HW/SW Interface) Application Guard the impact point "Security by NX-Bit" (only partial solution) "Security by Stack Canaries" (only partial solution) "Security by Shadow Stack" (CET - Wintel's new idea, again: partial solution)
  • 12. Open / Non-NDA v 33 slide # 12 Kinzinger Automation GmbH Cyberdefense – Option 3 – Secure ISA Technology Stack VISA (HW/SW Interface) Cybersecure Virtual ISA butterfly CPU (full security) Layer Layer OS: Tasks, MMU Cyber attack Application ChainofTrust Layer Withdraw all computer linguistic means needed to program / perform the attack at machine code level Layer
  • 13. Open / Non-NDA v 33 slide # 13 Kinzinger Automation GmbH Joint European Security Initiative
  • 14. Open / Non-NDA v 33 slide # 14 Kinzinger Automation GmbH Mission – European Secure ICT Standard JESI develops a new cybersecure processor type Based on a solid theoretical framework, its novel computing core IP, OS components, algorithms, and communication protocols define a future European Secure ICT Standard providing reliable cybersecurity against all kinds of malware, ransomware, viruses, worms, and Trojan horses that exploit coding errors, and most types of backdoors and key escrow implanted into SW or HW by non-EU manufacturers
  • 15. Open / Non-NDA v 33 slide # 15 Kinzinger Automation GmbH Main Use Cases Based on the results of the JESI foundation project SCCT – Secure Computing Core Technology – three JESI subprojects implement use cases of primary interest SVCT Secure Vehicular Communications Technology (networked environments in car / train / aircraft, and in stationary communications infrastructures) SIAT Secure Industrial Automation Technology (Industry 4.0, IoT, "secure PLC" and so on) SHPC Secure High Performance Computing (data center & cloud computing)
  • 16. Open / Non-NDA v 33 slide # 16 Kinzinger Automation GmbH Timeline Cybersecurity at highest JESI level is urgently needed to protect people, nations, and industries around the world from the impact of cyber espionage, sabotage, warfare, and terrorism. It is also vital for future digitalisation projects like Industry 4.0 and IoT JESI is therefore planned to deliver ASAP April, 2018 – submission to Horizon 2020 September/October 2018 – Project start 30 Months – Duration. Results: prototypes
  • 17. Open / Non-NDA v 33 slide # 17 Kinzinger Automation GmbH Partner per type per country per subproject AKKA IND SVCT Kinzinger SME SCCT Ficosa IND SVCT Bertrandt IND SVCT/SHPC FZI RTO SCCT Innovalia RTO SVCT CEA RTO SVCT TUD Uni SCCT Eneo SME SVCT INRIA RTO SVCT KIT Uni SIAT Nextel SME SVCT ESIEE Uni SVCT HAW Uni SCCT SQS SME SVCT Eurecom RTO SVCT Ikusi SME SVCT Montimage SME SVCT UAB Uni SCCT/SHPC Quirinus SME SVCT/SHPC YoGoKo SME SVCT SW Mobile SME SVCT F-AR RTO SIAT IMEC RTO SCCT JKU Uni SCCT KU Leuven Uni SCCT Beia SME SVCT Yagoba SME SCCT Germany South Korea Romania Austria SpainFrance Belgium
  • 18. Open / Non-NDA v 33 slide # 18 Kinzinger Automation GmbH Benefits for JESI Industry Partners JESI is bound to cause a major disruption of all mission critical ICT markets because ... ICT operators in critical application domains will run legal liability risks in case of damage or casualties caused by standard insecure ICT – as soon as secure solutions are available on the market they may be held legally accountable for not using them For JESI industry partners, this additional legal aspect is a winning game. They will be first in the evolving high security ICT market and benefit from more than two years technology lead in the SVCT, SIAT, and SHPC domains
  • 19. Open / Non-NDA v 33 slide # 19 Kinzinger Automation GmbH Call for Industry Partners LE partners with the following profiles / roles are sought: Automotive, train, avionics manufacturers or their component suppliers, e.g. SEAT, Bosch, Thales, Airbus Industrial automation suppliers with specific interest in Industry 4.0 and IoT, e.g. Siemens, Bosch, ABB Industry partners looking for strategic investment into an European ARM-like technology IP provider