Room: Florentine II
Organizer: Mark Tehranipoor, UFL
Moderator: Rob Aitken, ARM
- System-on-Chip Security for IoT: Some Unique Validation Challenges
Sandip Ray (Intel)Abstract: We are living in the regime of Internet-of-Things, — a regime where we are surrounded by billions of computing devices cooperating and interacting to provide us some of the most personalized and intimate computing services. Security and privacy are critical considerations of the IoT regime. Unfortunately, the very diversity of computing devices, the complexity of their architectures communication infrastructure, and their unique deployment models make security a challenge for computing systems in the IoT regime. Consequently, security validation is a key component in the development of a computing system, — its importance and complexity increasing at an alarming rate. In this talk, I will discuss the spectrum of security validation requirements for computing systems in ithis era, emphasizing specifically on the unique characteristics of IoT and its influence on the security infrastructure. I will discuss how the challenges change from the mobile (smartphone/tablet) to IoT, and comment on the unique research opportunities and challenges in this area
- IoT Authentication: Needs, Challenges and PUF-less Low-cost Solutions
Swarup Bhunia (University of Florida)Abstract: Authentication serves as the cornerstone of secure internet-of-things (IoT). It is often multi-faceted requiring mutual authentication between device and user/cloud and multi-layer, requiring system authentication at multiple levels. IoT authentication brings in several new challenges associated with their increased connectivity, long lifetime, heterogeneity, and interaction with the cloud. In this talk, we will highlight the authentication requirements for IoT devices, challenges, and interesting emerging solutions in this important space. In particular, it will focus on both chip and PCB-level hardware authentication solutions that do not rely on physical unclonable functions (PUF). They exploit the intrinsic variations in built-in structures in a chip/PCB to develop robust hard-to-clone signatures. The talk will also point to emerging needs and future directions in IoT authentication.
- DFT for Security from an IoT Perspective
Yier Jin (University of Central Florida)Abstract: Enter the era of Internet of Things (IoT), where small embedded devices loaded with sensors collect information from its surroundings, process it and relay it to remote locations for further analysis. Albeit looking harmless, this nascent technologies raise security concerns. We pose the question of the possibility and effects of compromising such devices. Concentrating on the design flow of IoT and wearable devices, we discuss some common design practices and their implications on security and privacy. Multiple commercial smart/IoT devices will be selected as examples on how current industry practices of security as an afterthought or an add-on affect the resulting device and the potential consequences to the user’s security and privacy. We then discuss design flow enhancements, through which security mechanisms can efficiently be added into a device, vastly differing from traditional practices.