Securing Applications With Firmware (Going Beyond TCPA Platform Security) Dr. Robert W. Baldwin Chief Scientist.

Slides:



Advertisements
Similar presentations
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Advertisements

Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
Vpn-info.com.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Musenki Enabling “hotspot” wireless Internet connectivity through technology and services.
TCPA TCPA TCPA T rusted C omputing P latform A lliance Saurabh Phansalkar.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
eToken PKI Client Overview
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
RSA SecurID November 10, 2005.
USB Flash Drives: Protecting Data And Enhancing Storage Steffen Hellmold VP and General Manager UFD BU Lexar.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Public Key Infrastructure Ammar Hasayen ….
Page Copyright Giritech A/S an – Excitor company.
Network Security Professor Professor Dr. Adeel Akram.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
9. Car-Borne Information System
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
1 PKI Update September 2002 CSG Meeting Jim Jokl
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Copyright 2006 IDC Reproduction is forbidden unless authorized. All rights reserved. Information Security Trends.
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
George L. Heron Technology Officer, SafeNet, Inc..
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
ClearTunnel Close the SSL Hole! Copyright ©2008 Collective Software, LLC.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
1 1 Social Security Platform James Wu We Simplify Security.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Hardware security: The use of a Trusted Platform Module
Trusted Computing and the Trusted Platform Module
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Enabling the hybrid cloud with remote access appliances
TPM, UEFI, Trusted Boot, Secure Boot
Presentation transcript:

Securing Applications With Firmware (Going Beyond TCPA Platform Security) Dr. Robert W. Baldwin Chief Scientist

2 Outline  Who is Phoenix Technologies?  What is Phoenix doing in Security?  Current & Future Partners

3 Phoenix Dominates PC BIOS  BIOS: Initialize & Manage PC Motherboard & Devices  Phoenix is 21 Years Old  80% PC Market Share  > 100 Million in 2001  Expanding to Set Top Box Internet Appliance Wireless Handheld  Prior Success With Power Management Plug n Play USB 100 Million PCs in 2001

4 Phoenix Partners & Customers

5 Phoenix FirstWare Opportunity  Motherboard Includes Protected Execution Environment  Past: Power Management USB, Plug n Play  Now: Firmware Smart Card for Each Application Application Integrity & Access Control RSA, AES, SHA1-HMAC World Wide Trust Infrastructure (PKI Initializes AES Smart Cards) Application Win OS StrongROM

6 Phoenix FirstWare Opportunity  Bind Data (Cryptographic Seal & Unseal): to Specific Application on Specific Device App-Device Pair Registered with Enterprise or Merchant  Checks Signature on In-Memory Application Code Viruses, Tampering, Reverse Engineering App Data Application

7 ProcessorChipsetI/O BIOSHidden NVRAMStrongROM H/W Motherboard ROM StrongROM RAM Buffer SMRAM Operating System Driver Runtime SMI FirstWare Architecture Root Key Device Key Application 2 Application Container 2 Application 1 Application Container 1 Pre-boot

8 FirstWare Product Areas  Check the Virus Checker & OS Loader  One-Time Password Authentication  Convenient Two-Factor Challenge-Response VPN Client, RAS Dial-Up, SSL Web Access  Protect RSA Private Key & Certificate VPN Client Certificate, , Purchasing Card  Software Licensing & Content DRM  Device Asset Control & Tracking

9 Phoenix cryptographic engine + security keys Phoenix StrongROM on motherboard StrongROM secured computer FirstWare Deployment StrongClient secured computer New PC, Handheld, Set Top Legacy & Non-Phoenix Devices Application Includes StrongClient WDM

10 Working With Security Partners  Chips Vendors  Motherboard & PC Makers  OS Vendors  Wireless & Handheld  Security App Vendors  Financial App Vendors  DRM Vendors  Trust Infrastructure Providers Phoenix FirstAuthority Device Security Server & SDK Phoenix FirstAuthority Server Family Device Authority Service Providers Phoenix FirstWare StrongROM & StrongCLIENT Device Manufacturers & System OEMs ISVs & IT Developers