Home > Tracks > Embedded Systems Security

Securing the IoT from Chip to Cloud:An Application Guide to Applying Platform Security Architecture (PSA) Principles

Jacob Beningo - Watch Now - Currently watching: 0

With the explosive growth in the Internet of Things (IoT) and the number of devices soaring, security is critical maintain device integrity and protect user privacy.However, designing consistent security across connected devices can be a minefield to navigate and implementation can be costly.Using a smart door lock as an example, in this webinar, attendees will learn how to design security from the ground up using PSA principles and guidelines with a PSoCŪ 64 secure MCU from Cypress Semiconductor.

Attendees will walk away with the best practices to develop their own security solutions.In addition, the importance of secure device management throughout the IoT products lifecycle will also be reviewed.

Topics Covered in this Webinar Include:

  • Developing a threat model and Defining security counter measures
  • Maintaining asset security through hardware architecture and security IP
  • Implementing trusted boot and Secure application partitioning
  • Using Trusted Firmware-M to isolate security critical functionality from non-secure code
  • Leveraging the Arm Pelion Secure IoT Device Management Platform for full device lifecycle management (design, onboard, provision, secure, update, manage, etc.)
M↓ MARKDOWN HELP
italicssurround text with
*asterisks*
boldsurround text with
**two asterisks**
hyperlink
[hyperlink](https://example.com)
or just a bare URL
code
surround text with
`backticks`
strikethroughsurround text with
~~two tilde characters~~
quote
prefix with
>

s.sclaverano
Score: 0 | 6 days ago | 1 reply

Your presentation was awesome!

Jacob_BeningoSpeaker
Score: 0 | 6 days ago | no reply yet

Thanks! I'm glad to hear that you enjoyed it.

DC-HON
Score: -1 | 6 days ago | 1 reply

Where would we find the whitepaper on the example model described in presentation?

Jacob_BeningoSpeaker
Score: 0 | 6 days ago | no reply yet

You can find the analysis paper at https://www.cypress.com/file/447056/download

DS
Score: 0 | 7 days ago | 1 reply

Very informative session. Thank you!

Jacob_BeningoSpeaker
Score: 0 | 7 days ago | no reply yet

You are welcome!

Colin_OFlynn
Score: 2 | 7 days ago | 2 replies

What's your feel on how realistic PSA's hardware threats are - there's a huge gap between the basic hardware hacker & the advanced attacker that is "out of scope" in PSA. Say someone at university level ('grad student who needs publications' threat) with moderate resources?

Matt_Liberty
Score: 1 | 7 days ago | 1 reply

Colin makes a great point. Colin's company, NewAE, sells the ChipWhisper which makes hardware-base crypto attacks affordable and easy. The ChipWhisper-Lite is only $250, and yes, that keeps me up at night ;) Hopefully, these secure elements have reasonable protections against differential power analysis. Colin, do you have any sense for how secure these Cypress and newer Cortex-M33 chips, such as the LPC55S6, are?

Colin_OFlynn
Score: 1 | 7 days ago | no reply yet

Secure elements (should) be good as are tested against these attacks! If you haven't seen the talk TrustZone-M(eh): Breaking ARMv8-M's security you're missing a chance to further worry yourself ;) I'm curious on the SiLabs newer EFR32MG21 as they are claiming a lot of countermeasures on a mostly public part (i.e., no NDA required) but need more time to look at it...

Jacob_BeningoSpeaker
Score: 1 | 7 days ago | 1 reply

I think that in general, PSA provides a good set of basic threats and considerations for developers. There are a lot of teams out there that give zero consideration to security. PSA as you mention isn't a one size fits all solution, but it at least gets the average developer thinking about security.

There are certainly areas where PSA could go further such as in furthering isolated execution environments for trusted applications and reaching secure element functionality.

I hope that answers your question, if not please feel free to clarify and I'm happy to answer.

Colin_OFlynn
Score: 0 | 7 days ago | no reply yet

Makes sense - the "zero security consideration" means PSA will help a lot for those! As well as stopping easy issues like key re-use etc. I just hadn't seen as much detail on the "in-between attacker level" in PSA yet so always trying to get a feel from others working with it.

Jacob_BeningoSpeaker
Score: 0 | 7 days ago | no reply yet

Hello Everyone! Welcome to my session! If you have any questions or comments please feel free to enter them into the question area!

OUR SPONSORS