europeanprocessor initiative (epi) embedded security€¦ · prove & run confidential 6 epi...

Post on 13-Aug-2020

5 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Prove & Run Confidential 1

77, avenue Niel, 75017 Paris, Francecontact@provenrun.com

European Processor Initiative (EPI) Embedded Security

Prove & Run Confidential 2

Prove & Run – Security Services and Solutions

Consulting Services

• Security analysis• Security architecture

Solutions to secure-by-design critical ECUs

• Leveraging on 2 unique critical off-the-shelf software components:

• ProvenCore : ultra secure OS

• ProvenVisor: secure hypervisor

A B

Prove & Run Confidential 3

Prove & Run Team (some related references)• Prove & Run team has a long experience in

assisting major chip vendors with the their hardware and software (security) architectures,

• Prove & Run key senior security architects have assisted about half of the top ten chip vendors worldwide in designing or improving some of their major security architectures.

• Prove & Run has been associated (as a consultant) to many security projects for ARM (such as writing various Protection Profiles or security requirements for ARM, in various market segment : Smartphones, IoT, gateways, Cloud, etc.).

• In charge of defining EPI Hardware and Software Security Architecture.

Prove & Run Confidential 4

Security: Certification is the final judge

Prove & Run has completed a Common Criteria EAL7 evaluation of ProvenCore.

This is a world première

There is no existing TEE or Secure OS at that level of security.

Formally verified of the complete TCB

Also a world première

Prove & Run Confidential 5

EPI Security Needs and Security Architecture

Prove & Run Confidential 6

EPI (Basic) Security Needs• Providing a strong root of trust,• Advanced cryptographic support,• Providing a safe deposit for keys,• Providing key derivation services,• Supporting full product life cycle (including the

manufacturing and personalization phases),• Providing secure debug functionality,• Support for independent application providers

(and enforcing no interdependence between them in regards of development and certification)

• Support for secure and selective firmware update • Support for rollback,• Etc.

Prove & Run Confidential 7

EPI (More advanced) Security Needs

• High level of certification,• High level of trust,

• Security certification (by various bodies)• Security domains (each one including a

configurable set of application processors),

• The possibility for a security domain to execute and isolate a secure OS,

• The possibility for a security domain to control a configurable list of peripherals,

Prove & Run Confidential 8

EPI High Level Security Architecture

AXI

AXI

APB

SMU

Security Element

RoT

OTP

INTR

from GIC Redistributor

to tile.SYSCTRL.PMU

APB

from Control Network

to Control Network to NoC.R07

PUF

eFuse

Secure MCU

Dom #1

SRAM

AES/SHAECC/RSA

TRNG

Secure MCU

Dom #2

SRAM

AES/SHAECC/RSA

TRNG

Secure MCU

Dom #3

SRAM

AES/SHAECC/RSA

TRNG

Secure MCU

Dom #4

SRAM

AES/SHAECC/RSA

TRNG

Master Secure MCU

SRAM

AES/SHAECC/RSA

TRNG

Secure DMA

EPI proprietary

top related