SlideShare a Scribd company logo
1 of 17
Hardware Security in Connected World
Jakub Bartoszek
Head of Solutions Architects, B2B Presales support
Samsung R&D Institute Poland
□
What is the Connected World?
The Fourth Industrial Revolution
Trends: Convergence & Risk
Mobility is where these trends converge.
At Samsung we are applying the lessons learned from the first wave of mobility to these evolutions.
• Speed
• Near-zero latency
• Unknown, untrusted networks5G
IoT
AI
• 25+ billion endpoints by 2020
• Increased attack surfaces
• Different endpoints to support
• Beyond personal digital assistants
• Cognitive decision making
• Do you trust the apps and the
algorithms?
• Tampering can have catastrophic
downstream effects.
Every network-connected endpoint
must be inherently secure.
Mobile security has never been a
more urgent concern than it is today.
Risk Mitigation
Risk Mitigation in Connected World
Comprehensive security strategy
• Validated, proven hardware
• Validated, secure firmware
• Secure transport/networks
• Security management infrastructure:
• Unified Endpoint Management
• Mobile Threat Defense (AI is your friend)
• Buy into an open-standards ecosystem (plug, play, swap as needed)
The Importance of hardware-based Security
Truly secure computing must address all
layers of your devices
Hardware
• Warranty Bit
• Device Unique Root Key
• Samsung Secure Boot Key
Application Layer
• Knox Workspace Container
• Sensitive Data Protection (during runtime)
• On Disk Encryption
• SE Android
• Client Certificate Management
• Keystore Management
• Device Attestation
• Realtime Kernel Protection
Firmware / Operating System
• Firmware Rollback Prevention
• Trusted and Verified Boot
• Secure Boot
Knox Security: The long story of securing your world
There are critical steps to ensure the integrity of any device.
Hardware Root of Trust
• Irretrievable device unique
hardware keys are built in
 only accessible via
TrustZone
Build Trust
• Verifies all booting
components using
TrustZone
• If compromised,
Workspace container
gets locked
Maintain Trust
• Prevent unauthorized
Kernel access or code
modification
• Sensitive data are kept
encrypted even after
powered on
• Verify the integrity of
device security using
EMM
 Measurements
guaranteed per device
Building trust
Manufacturing time Booting time Run time
Maintaining trust
Why Real-time Protection
It is critical to protect the device and its data while in
use, as people do not power down devices often.
• All data encrypted
• Integrity check at boot-up
• All data decrypted
• No kernel protection
• All data encrypted
• Integrity check at boot-up
• Personal data decrypted, but
important work data stays
encrypted  decrypted when
Knox container is unlocked
• The kernel is protected in
run-time
Power
ON
AOSP
Samsung
Knox
Power
OFF
Trusted by Experts and Government Bodies
of Any Mobile Security Platform by
Meets stringent government security standards worldwide including MDFPP of NIAP
Most “Strong” Ratings
Mobile Device Security: A Comparison of Platforms 2019
Securing the Next Mobile Economy
Intelligence into Security & Management
Introducing Knox Analytics
“Adaptive” and “Automated” Security and Management for 5G / IoT
“Adaptive” and “Automated” Security and Management for 5G / IoT
Thank You
Jakub Bartoszek
j.bartoszek@samsung.com

More Related Content

What's hot

Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryptionguest990c6c
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of ThingsDavid Strom
 
Cincinnati window shade technology overview
Cincinnati window shade technology overviewCincinnati window shade technology overview
Cincinnati window shade technology overviewrippea
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Digital Bond
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet GENIANS, INC.
 
Final project
Final projectFinal project
Final projectrippea
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
UniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementUniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementFrans Bolk
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control networkTanveer Malik
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code ScannerLuigi Perrone
 
Security architecture design patterns iltam 2018 - ofer rivlin
Security architecture design patterns   iltam 2018 - ofer rivlinSecurity architecture design patterns   iltam 2018 - ofer rivlin
Security architecture design patterns iltam 2018 - ofer rivlinOfer Rivlin, CISSP
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_designNCC Group
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Tyler Shields
 
Understanding Technology Stakeholders
Understanding Technology StakeholdersUnderstanding Technology Stakeholders
Understanding Technology StakeholdersJohn Gilligan
 

What's hot (20)

Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
Cincinnati window shade technology overview
Cincinnati window shade technology overviewCincinnati window shade technology overview
Cincinnati window shade technology overview
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
Final project
Final projectFinal project
Final project
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
UniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementUniQ-ID Identity and Access Management
UniQ-ID Identity and Access Management
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
kali linix
kali linixkali linix
kali linix
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
Security architecture design patterns iltam 2018 - ofer rivlin
Security architecture design patterns   iltam 2018 - ofer rivlinSecurity architecture design patterns   iltam 2018 - ofer rivlin
Security architecture design patterns iltam 2018 - ofer rivlin
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
TGT#10 - IAST (Short talk) - Eugene Nosenko
TGT#10 - IAST (Short talk) - Eugene NosenkoTGT#10 - IAST (Short talk) - Eugene Nosenko
TGT#10 - IAST (Short talk) - Eugene Nosenko
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
 
Understanding Technology Stakeholders
Understanding Technology StakeholdersUnderstanding Technology Stakeholders
Understanding Technology Stakeholders
 

Similar to Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Iot secure connected devices indicthreads
Iot secure connected devices indicthreadsIot secure connected devices indicthreads
Iot secure connected devices indicthreadsIndicThreads
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0Javier Gonzalez
 
LAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT ZephyrLAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT ZephyrShovan Sargunam
 
Android security maximized by samsung knox
Android security maximized by samsung knoxAndroid security maximized by samsung knox
Android security maximized by samsung knoxJavier Gonzalez
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentMark Szewczul, CISSP
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcommTien Hoang
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 

Similar to Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World (20)

Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
IoT security
IoT securityIoT security
IoT security
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
 
Iot secure connected devices indicthreads
Iot secure connected devices indicthreadsIot secure connected devices indicthreads
Iot secure connected devices indicthreads
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
 
LAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT ZephyrLAS16-300K2: Geoff Thorpe - IoT Zephyr
LAS16-300K2: Geoff Thorpe - IoT Zephyr
 
Android security maximized by samsung knox
Android security maximized by samsung knoxAndroid security maximized by samsung knox
Android security maximized by samsung knox
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Mobile Security Qualcom   mr. patrick tsie - qualcommMobile Security Qualcom   mr. patrick tsie - qualcomm
Mobile Security Qualcom mr. patrick tsie - qualcomm
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
Building Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure SphereBuilding Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure Sphere
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 

More from Codiax

Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...Codiax
 
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluationCostas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluationCodiax
 
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...Codiax
 
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...Codiax
 
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...Codiax
 
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...Codiax
 
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videosAdria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videosCodiax
 
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...Codiax
 
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...Codiax
 
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...Codiax
 
Matthias Feys (ML6) – Bias in ML: A Technical Intro
Matthias Feys (ML6) – Bias in ML: A Technical IntroMatthias Feys (ML6) – Bias in ML: A Technical Intro
Matthias Feys (ML6) – Bias in ML: A Technical IntroCodiax
 
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...Codiax
 
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Codiax
 
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...Codiax
 
Maciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeMaciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeCodiax
 
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...Codiax
 
Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...
Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...
Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...Codiax
 
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...Codiax
 
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?Codiax
 
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network ServerAlexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network ServerCodiax
 

More from Codiax (20)

Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
 
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluationCostas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
 
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
 
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
 
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
 
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
 
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videosAdria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videos
 
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
 
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
 
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
 
Matthias Feys (ML6) – Bias in ML: A Technical Intro
Matthias Feys (ML6) – Bias in ML: A Technical IntroMatthias Feys (ML6) – Bias in ML: A Technical Intro
Matthias Feys (ML6) – Bias in ML: A Technical Intro
 
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
 
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
 
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
 
Maciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeMaciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The Trade
 
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
 
Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...
Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...
Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...
 
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
 
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
 
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network ServerAlexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World

  • 1. Hardware Security in Connected World Jakub Bartoszek Head of Solutions Architects, B2B Presales support Samsung R&D Institute Poland □
  • 2. What is the Connected World?
  • 3.
  • 5. Trends: Convergence & Risk Mobility is where these trends converge. At Samsung we are applying the lessons learned from the first wave of mobility to these evolutions. • Speed • Near-zero latency • Unknown, untrusted networks5G IoT AI • 25+ billion endpoints by 2020 • Increased attack surfaces • Different endpoints to support • Beyond personal digital assistants • Cognitive decision making • Do you trust the apps and the algorithms? • Tampering can have catastrophic downstream effects.
  • 6. Every network-connected endpoint must be inherently secure. Mobile security has never been a more urgent concern than it is today.
  • 8. Risk Mitigation in Connected World Comprehensive security strategy • Validated, proven hardware • Validated, secure firmware • Secure transport/networks • Security management infrastructure: • Unified Endpoint Management • Mobile Threat Defense (AI is your friend) • Buy into an open-standards ecosystem (plug, play, swap as needed)
  • 9. The Importance of hardware-based Security Truly secure computing must address all layers of your devices Hardware • Warranty Bit • Device Unique Root Key • Samsung Secure Boot Key Application Layer • Knox Workspace Container • Sensitive Data Protection (during runtime) • On Disk Encryption • SE Android • Client Certificate Management • Keystore Management • Device Attestation • Realtime Kernel Protection Firmware / Operating System • Firmware Rollback Prevention • Trusted and Verified Boot • Secure Boot
  • 10. Knox Security: The long story of securing your world There are critical steps to ensure the integrity of any device. Hardware Root of Trust • Irretrievable device unique hardware keys are built in  only accessible via TrustZone Build Trust • Verifies all booting components using TrustZone • If compromised, Workspace container gets locked Maintain Trust • Prevent unauthorized Kernel access or code modification • Sensitive data are kept encrypted even after powered on • Verify the integrity of device security using EMM  Measurements guaranteed per device Building trust Manufacturing time Booting time Run time Maintaining trust
  • 11. Why Real-time Protection It is critical to protect the device and its data while in use, as people do not power down devices often. • All data encrypted • Integrity check at boot-up • All data decrypted • No kernel protection • All data encrypted • Integrity check at boot-up • Personal data decrypted, but important work data stays encrypted  decrypted when Knox container is unlocked • The kernel is protected in run-time Power ON AOSP Samsung Knox Power OFF
  • 12. Trusted by Experts and Government Bodies of Any Mobile Security Platform by Meets stringent government security standards worldwide including MDFPP of NIAP Most “Strong” Ratings Mobile Device Security: A Comparison of Platforms 2019
  • 13. Securing the Next Mobile Economy
  • 15. Introducing Knox Analytics “Adaptive” and “Automated” Security and Management for 5G / IoT
  • 16. “Adaptive” and “Automated” Security and Management for 5G / IoT