pervasive
play

PERVASIVE Home ! Work ! Play 2 2 Pervasive (Home) TURBOCHEF - PDF document

Embedded Systems Silicon Valley 2011 ESC-202 Implementing Secure Remote Firmware Updates Tuesday May 3 rd , 8:00 9:15 Loren Shade loren@allegrosoft.com 1 1 PERVASIVE Home ! Work ! Play 2 2 Pervasive (Home) TURBOCHEF


  1. Embedded Systems Silicon Valley 2011 ESC-202 Implementing Secure Remote Firmware Updates Tuesday May 3 rd , 8:00 – 9:15 Loren Shade loren@allegrosoft.com 1 1 PERVASIVE Home ! Work ! Play 2 2

  2. Pervasive (Home) TURBOCHEF www.turbochef.com MOXI www.moxi.com CONTROL4 www.control4.com YAMAHA neoHD BAINULTRA usa.yamaha.com www.bainultra.com 3 3 Pervasive (Work) BROCADE www.brocade.com CISCO VOIP PHONE www.cisco.com iPhone 4 www.control4.com Verizon FIOS ONT XEROX PRINTER www.verizon.com www.xerox.com 4 4

  3. 5 5 6 6

  4. Pervasive (Play) MARKIV DiskLavier PRO usa.yamaha.com KINDLE XBOX 360 www.amazon.com www.microsoft.com GARMIN www.garmin.com THUNDER-MAX FRETLIGHT www.thunder-max.com www.fretlight.com 7 7 FAD or FOREVER Microsoft Expects 10 Year Lifecycle for Xbox 360 Microsoft Expects 10 Years Lifecycle for Xbox 360 : Microsoft Xbox 360 to Have 10 Years Lifecycle, Anton Shilov, Xbit Laboratories, June 2009, http://www.xbitlabs.com/news/multimedia/display/20090603230547_Microsoft_Expects_10_Years_Lifecycle_for_Xbox_360.html 8 8

  5. Changes in Business Model • Product Business Models Endorse Updates • Extend Product Lifecycle • Engage Customers (Cross sell and upgrades) • Support and Service • $$$$$$$$$$$ 9 9 Security and Remote Updates • Remote Update Implementations often Proprietary • Often None Standard Protocols • Often NO Security 10 10

  6. 11 11 Security is a PROCESS!! “Security is a chain; it is only as secure as the weakest link ! ” “Security is a process, not a product” Bruce Schneier Secrets & Lies Example - Defense Contractors working with DOE/DOD classified material 12 12

  7. Implementation Areas Hardware Software (RTOS, Application) Operational Security Communications 13 13 Requirements • Leverage Established Standards • Authenticate Downloads • Validate Downloads • Versatile Communications Solution • Scalability • Cancel update on failed Authentication or Validation 14 14

  8. Simple Communications Framework 15 15 Security, Validation and Authentication • Key Pair – Public ( pk ) and Secure Private ( sk ) • Calculating Signature (FIPS 186-3) • Hash (FIPS 180-2) • Signature Calculation • Append Result 16 16

  9. Digital Signature Process SOURCE: FIPS 186-3 (pg 9) 17 17 Implementation 18 18

  10. Trusted Authority in Development Cycle 19 19 Communications Architecture • HTTP • HTML/XHTML • XML 20 20

  11. Embedded Software Logic • TRUSTED DOWNLOAD (Subroutine) • DOWNLOAD LOGIC 21 21 Trusted Download 22 22

  12. Download Logic 23 23 Firmware Repository Organization • Simple XML • Variations employ server side logic 24 24

  13. Example XML <?xml version="1.0"?> <Revisions> <Product> <Name>RDMC 101</Name> <Major>1</Major> <Minor>50</Minor> <Beta>34</Beta> <Path>/files/RDMCv150b34.bin</Path> <Description>Beta 34 for RDMC 101 v1.5</Description> </Product> <Product> <Name>RPLAY 303</Name> <Major>1</Major> <Minor>00</Minor> <Beta>10</Beta> <Path>/files/rplay.100b10</Path> <Description>Beta 10 for RPLAY 303</Description> </Product> </Revisions> 25 25 Example Update Screen 26 26

  14. Questions & Comments loren@allegrosoft.com - 203-542-8166 Slides, Notes and Paper available at www.allegrosoft.com/escsv2011 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend