Information Security of Embedded Systems 4.11.2009: Embedded Systems Design Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.

Slides:



Advertisements
Similar presentations
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Advertisements

Computer Science in Freiberg Konrad Froitzheim, TU Freiberg, Germany TUBAF Institut für Informatik Curriculae Research Highlights.
Prescriptive Process models
Software Verification 1 Deductive Verification Prof. Dr. Holger Schlingloff Institut für Informatik der Humboldt Universität und Fraunhofer Institut.
The System-Level Simplex Architecture Stanley Bak Olugbemiga Adekunle Deepti Kumar Chivukula Mu Sun Marco Caccamo Lui Sha.
Information Security of Embedded Systems
Software Processes Coherent sets of activities for specifying, designing, implementing and testing software systems.
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
MotoHawk Training Model-Based Design of Embedded Systems.
Asa MacWilliams Lehrstuhl für Angewandte Softwaretechnik Institut für Informatik Technische Universität München Dec Software.
Formal Methods of Systems Specification Logical Specification of Hard- and Software Prof. Dr. Holger Schlingloff Institut für Informatik der Humboldt.
Formal Methods of Systems Specification Logical Specification of Hard- and Software Prof. Dr. Holger Schlingloff Institut für Informatik der.
Information Security of Embedded Systems : Foundations of Security II Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Software Engineering COMP 201
Information Security of Embedded Systems : Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Information Security of Embedded Systems : Embedded Systems – Terms and Definitions Prof. Dr. Holger Schlingloff Institut für Informatik und.
Virtual reality interfaces in connection with building process simulations. Prof. Nash Dawood Centre for Construction Innovation Research University of.
Department of Electrical and Computer Engineering Texas A&M University College Station, TX Abstract 4-Level Elevator Controller Lessons Learned.
Lecture 13 Revision IMS Systems Analysis and Design.
1 Introduction to Software Engineering Lecture 42 – Communication Skills.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
The Mechatronics Design Lab Course at the University of Calgary Presented June 2, 2003.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Information Security of Embedded Systems : remote access, wireless networks Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Self-Contained Particulate Filter Filter 3 Presenters: Ian Gray, Kyhia Bostic Demo Given by: Nathan Sullivan.
Arduino Week 3 Lab ECE 1020 Prof. Ahmadi. Objective Data acquisition (DAQ) is the process of measuring an electrical or physical phenomenon such as voltage,
Information Security of Embedded Systems : BAN-Logic Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
SCADA and Telemetry Presented By:.
Filton Low Speed Wind Tunnel. Lecture Overview Why do we need low speed wind tunnel testing Wind tunnel technology Instrumentation overview Expected daily.
TECHNOLOGY DEMONSTRATOR OF 7-CHANNEL DIGITAL FLIGHT DATA RECORDER AS AVIONICS TEACHING AID USING STATIC MODEL AIRCRAFT Authors 1. Wg Cdr Nikhil Verma,
BAND-AiDe: A Tool for Cyber-Physical Oriented Analysis and Design of Body Area Networks and Devices Authors: Ayan Banerjee, Sailesh Kandula, Tridib Mukherjee.
Sensors and Actuator Network Based Architectures and Protocols for Smart Homes Bluetooth enabled Smart Home Mark Shaw Giorgio Politano Supervisor: Mieso.
Information Security of Embedded Systems : Logics and Proof Methods, Wrap-Up Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
3- System modelling An architectural model presents an abstract view of the sub-systems making up a system May include major information flows between.
 eBlock is an electronics block.  It can define as embedded system building block used in sensor based system.  Enable non-experts to build basic small-scale.
An Introduction to Software Architecture
INTEGRATED SYSTEMS 1205 Technology Education A Curriculum Review Sabine Schnepf-Comeau July 19, 2011 ED 4752.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 3 Slide 1 Software Processes l Coherent sets of activities for specifying, designing,
[ §3 : 1 ] 2. Life-Cycle Perspective Overview 2.1 Motivation 2.2 Waterfall Model 2.3 Requirements in Context.
Foot Throttle Foot throttle device for lower limb rehabilitation.
Power Plant Construction and QA/QC Section 5.4 – Key Systems and Components Engineering Technology Division.
Software Verification 2 Automated Verification Prof. Dr. Holger Schlingloff Institut für Informatik der Humboldt Universität and Fraunhofer Institut für.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
WXGE6103 Software Engineering Process and Practice Formal Specification.
Lecture 7: Requirements Engineering
Measurement and Control. Control Systems A control system usually consists of a processor, a control program, interfaces and a device under the processor's.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
1 Context-dependent Product Line Practice for Constructing Reliable Embedded Systems Naoyasu UbayashiKyushu University, Japan Shin NakajimaNational Institute.
Advanced Controls and Sensors David G. Hansen. Advanced Controls and Sensors Planning Process.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
10/5/2009 These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
1 Chap. 2 Protocol. 2 Communication model Simplified communication model  source node  gather data from sensor or switch using ADC (analog-to-digital.
Introduction Architecture Hardware Software Application Security Logical Attack Physical Attack Side channel Attack.
CISSP Common Body of Knowledge Review by Alfred Ouyang is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
I & C.
CS223: Software Engineering
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
SAMCAHNG Yun Goo Kim I. Formal Model Based Development & Safety Analysis II. UML (Model) Based Safety RMS S/W Development February KIM, YUN GOO.
HAPTIC TECHNOLOGY ASHWINI P 1PE06CS017.
Jeopardy Heading1Heading2Heading3Heading4 Heading5 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
CONTENTS:  INTRODUCTION & HISTORY  EXISTING SYSTEM & DIS-ADVANTAGES  PROPOSED SYSTEM  RESULT ANALYSIS  ADVANTAGES  APPLICATIONS  CONCLUSION.
Lesson 1 PLC BASICS. PLC Definition  Programmable Logic Controllers are industrial computers that control machine and other applications.  PLC have.
SS 2017 Software Verification Bounded Model Checking, Outlook
AQA GCSE 6 Systems approach to designing Design and Technology 8552
SS 2018 Software Verification LTL Satisfiability applied
CONTROL SYSTEM AN INTRODUCTION.
Presentation transcript:

Information Security of Embedded Systems : Embedded Systems Design Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST

Embedded Security © Prof. Dr. H. Schlingloff Structure 1. Introductory example 2. Embedded systems engineering 1.definitions and terms 2.design principles 3. Foundations of security 1.threats, attacks, measures 2.construction of safe systems 4. Design of secure systems 1.design challenges 2.safety modelling and assessment 3.cryptographic algorithms 5. Communication of embedded systems 1.remote access 2.sensor networks 6. Algorithms and measures 1.digital signatures 2.key management 3.authentification 4.authorization 7. Formal methods for security 1.protocol verification 2.logics and proof methods

Embedded Security © Prof. Dr. H. Schlingloff Embedded Systems Design Waterfall or V-Model small to medium design groups civil engineers, electrical engineers software often not valued Model-based design Matlab/Simulink, UML code generation Product lines no real system is developed from scratch look-and-feel, component reuse

Embedded Security © Prof. Dr. H. Schlingloff The State of an Object Technical systems convert or relocate physical objects (matter and/or energy) Physical objects are characterized by their state State = observable appearance of an object in space and time a complete description of a system in terms of parameters such as positions and momentums at a particular moment in time (wiki) shape, size, position, movement, temperature, pressure, voltage, … Observation of physical state by sensors camera, folding rule, light sensor, tachometer, thermometer, … Modification of physical state by actuators motor, valve, relais, transducer, heater, …

Embedded Security © Prof. Dr. H. Schlingloff Technical Systems and Processes Technical system: perform technical process Technical process: reshaping or transporting physical objects Description of states by state variables formally, a state is a mapping of variables to values Description of processes by state changes discrete state changes are called events continuously changing state constituents are sometimes called signals

Embedded Security © Prof. Dr. H. Schlingloff Example A toaster what is the technical process? what are the states, events and signals of the (technical) process? what are the boundaries of the system? which information processing is to be done? what are the interfaces between technical system and information processing component?

Embedded Security © Prof. Dr. H. Schlingloff Systematic design of embedded systems 1. Identify the boundaries of the system, the technical process, the control task focus on user perspective 2. Identify the state constituents of the system physical properties: mass, pressure, temperature, … user interfaces: switches, displays, interactions, … 3. Formally represent states by state variables in general, state variables are time-dependent functions; a state of the system is given by the value of all state variables at a given moment each state variable has a dimension and range of values (e.g. temperature t in °C or °F, length l in m, mm or in)

Embedded Security © Prof. Dr. H. Schlingloff Describe properties of the variables side conditions, e.g. 0<t<100 (physical) relations between variables, e.g. t Toast <t Heater 5. Determine which variables can be monitored and which can be controlled monitored variable: can be observed by the controller controlled variable: can be influenced by controller some environment variables are both monitored and observed 6. Define control functionality mapping of monitored into controlled values, e.g. h=c*|t s -t i |

Embedded Security © Prof. Dr. H. Schlingloff Controlling Technical Processes Control theory design, identification and analysis of systems to make them perform specific tasks or make them behave in a desired way (free dictionary) DIN Steuerung (open loop control) ist ein Vorgang in einem System, bei dem eine oder mehrere Größen als Eingangsgrößen die Ausgangsgrößen auf Grund der dem System eigentümlichen Gesetzmäßigkeiten beeinflussen. Regelung (closed loop control) ist ein Vorgang, bei dem fortlaufend eine Größe, die Regelgröße (zu regelnde Größe), erfasst, mit einer anderen Größe, der Führungsgröße, verglichen und im Sinne einer Angleichung an die Führungsgröße beeinflusst wird. Achtung: Steuergeräte sind meist zur Regelung von Prozessen!

Embedded Security © Prof. Dr. H. Schlingloff Controls Open-loop control (Steuerung) Example: Toaster without thermostat Closed-loop control (Regelung) Example: Toaster with thermostat Controls Plant (Strecke) Reference value (Sollwert) Controls output / System input (Stellgröße) System output (Regelgröße) Regler Regelstrecke Reference (Sollwert) System input (Stellgröße) System output (Regelgröße) Stellglied (Aktuator) Messglied (Sensor) Control signal (Reglersignal) Measured value (Istwert) Environment (Störgröße) (Führungs- größe) (Rückführungsgröße)

Embedded Security © Prof. Dr. H. Schlingloff Other pictures for the same Controller (Steuer- gerät) Aktuators Sensors Plant (Strecke) Environment techn. system Controller

Embedded Security © Prof. Dr. H. Schlingloff PID-Controller proportional–integral–derivative controller proportional part: reaction to the current deviation - e.g. out(t) = 5 * |in(t) – refval| integral part: reaction based on the accumulated recent deviation - e.g. out(t) = 0.3 * Σ t =0 (in( ) – refval) derivative part: reaction based on the rate at which the deviation has been changing - e.g. out (t) = 0.1 * d/d (in( ) – refval( )) Tuning (setting parameters) can be manually or by tools (e.g.

Embedded Security © Prof. Dr. H. Schlingloff

Embedded Security © Prof. Dr. H. Schlingloff Controller variables Discretization: monitored and controlled variables are translated by A/D and D/A converters into input and output variables of the control software attention: a controller output is a plant input and vice versa! Usually, the controller has additional internal variables hidden to the outside! Testing interfaces are security holes!

Embedded Security © Prof. Dr. H. Schlingloff Sense-Think-Act Functional systems follow the paradigm input-process-output Embedded systems follow loop{sense-think-act} main loop repeated indefinitely: - read sensor values - calculate deviation or action - write actuator outputs