<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: IoT security workshop</title>
	<atom:link href="http://www.epanorama.net/blog/2017/09/07/iot-security-workshop/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 16 Apr 2026 06:23:33 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/comment-page-1/#comment-1565622</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 05 Oct 2017 08:41:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59029#comment-1565622</guid>
		<description><![CDATA[ARM’s Rob Coombs provides six mobile security practices worth using in IoT devices.

Six ways to re-use mobile security practices in your next IoT project
https://community.arm.com/iot/b/blog/posts/six-ways-to-re-use-mobile-security-practices-in-your-next-iot-project

1. No shared secrets (or protect them in hardware)
2. Use hardware based security
3. Keep it agile
4. Protect data in flight (use TLS – aka SSL)
5. Use IoT platforms that build in security functions
6. Pay for a third-party company to expose the security flaws in your design

Conclusion

It is now possible to apply mobile security techniques to IoT at all cost points. The introduction of TrustZone on microcontrollers as well as application processors, together with availability of security subsystems, offers a defense in-depth architecture which can be used to protect critical code and assets (such as cryptographic keys). The next step is to make it easier for IoT developers – who are not security experts – to use this architecture. A pragmatic way for most product developers is to choose an IoT platform that builds in security functions (such as OTA updates, TLS, and crypto libraries), as well as using the security hardware being built in by the chip vendors.]]></description>
		<content:encoded><![CDATA[<p>ARM’s Rob Coombs provides six mobile security practices worth using in IoT devices.</p>
<p>Six ways to re-use mobile security practices in your next IoT project<br />
<a href="https://community.arm.com/iot/b/blog/posts/six-ways-to-re-use-mobile-security-practices-in-your-next-iot-project" rel="nofollow">https://community.arm.com/iot/b/blog/posts/six-ways-to-re-use-mobile-security-practices-in-your-next-iot-project</a></p>
<p>1. No shared secrets (or protect them in hardware)<br />
2. Use hardware based security<br />
3. Keep it agile<br />
4. Protect data in flight (use TLS – aka SSL)<br />
5. Use IoT platforms that build in security functions<br />
6. Pay for a third-party company to expose the security flaws in your design</p>
<p>Conclusion</p>
<p>It is now possible to apply mobile security techniques to IoT at all cost points. The introduction of TrustZone on microcontrollers as well as application processors, together with availability of security subsystems, offers a defense in-depth architecture which can be used to protect critical code and assets (such as cryptographic keys). The next step is to make it easier for IoT developers – who are not security experts – to use this architecture. A pragmatic way for most product developers is to choose an IoT platform that builds in security functions (such as OTA updates, TLS, and crypto libraries), as well as using the security hardware being built in by the chip vendors.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/comment-page-1/#comment-1563483</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 19 Sep 2017 13:04:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59029#comment-1563483</guid>
		<description><![CDATA[Synopsys Teams With SMIC, Brite Semi on IoT Platform
http://www.eetimes.com/document.asp?doc_id=1332314&amp;

 EDA and IP vendor Synopsys Inc. has partnered with Chinese foundry Semiconductor Manufacturing International Corp. (SMIC) and ASIC design services specialist Brite Semiconductor to create a platform for Internet of Things (IoT) designs based on a Synopsys IP subsystem.

The IoT platform lowers design costs by providing customers with a  starting point for creating IoT designs and enables the integration of customized functions on demand, the companies said.

The platform includes Synopsys&#039; DesignWare ARC Data Fusion Subsystem along with an ARC EM9D processor, USB and I3C IP solutions, according to the companies. It was integrated by Brite Semi&#039;s design services using SMIC&#039;s 55-nm ultra-low power process, resulting in the development of a test chip demonstrating up to 45 percent reduction in dynamic power and 70 percent reduction in leakage power compared to SMIC&#039;s 55LL process, they said.

Synopsys&#039; ARC Data Fusion IP Subsystem is a pre-verified hardware and software IP product optimized for use in devices requiring minimal energy consumption.]]></description>
		<content:encoded><![CDATA[<p>Synopsys Teams With SMIC, Brite Semi on IoT Platform<br />
<a href="http://www.eetimes.com/document.asp?doc_id=1332314&#038;amp" rel="nofollow">http://www.eetimes.com/document.asp?doc_id=1332314&#038;amp</a>;</p>
<p> EDA and IP vendor Synopsys Inc. has partnered with Chinese foundry Semiconductor Manufacturing International Corp. (SMIC) and ASIC design services specialist Brite Semiconductor to create a platform for Internet of Things (IoT) designs based on a Synopsys IP subsystem.</p>
<p>The IoT platform lowers design costs by providing customers with a  starting point for creating IoT designs and enables the integration of customized functions on demand, the companies said.</p>
<p>The platform includes Synopsys&#8217; DesignWare ARC Data Fusion Subsystem along with an ARC EM9D processor, USB and I3C IP solutions, according to the companies. It was integrated by Brite Semi&#8217;s design services using SMIC&#8217;s 55-nm ultra-low power process, resulting in the development of a test chip demonstrating up to 45 percent reduction in dynamic power and 70 percent reduction in leakage power compared to SMIC&#8217;s 55LL process, they said.</p>
<p>Synopsys&#8217; ARC Data Fusion IP Subsystem is a pre-verified hardware and software IP product optimized for use in devices requiring minimal energy consumption.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/comment-page-1/#comment-1562119</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 09:43:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59029#comment-1562119</guid>
		<description><![CDATA[http://www.aalto.fi/en/current/events/2017-07-12/]]></description>
		<content:encoded><![CDATA[<p><a href="http://www.aalto.fi/en/current/events/2017-07-12/" rel="nofollow">http://www.aalto.fi/en/current/events/2017-07-12/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/comment-page-1/#comment-1562118</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 09:42:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59029#comment-1562118</guid>
		<description><![CDATA[SELIOT
: Research Summary
https://wiki.aalto.fi/download/attachments/120460118/wifius16-proposal-public.pdf?version=1&amp;modificationDate=1494596154122&amp;api=v2]]></description>
		<content:encoded><![CDATA[<p>SELIOT<br />
: Research Summary<br />
<a href="https://wiki.aalto.fi/download/attachments/120460118/wifius16-proposal-public.pdf?version=1&#038;modificationDate=1494596154122&#038;api=v2" rel="nofollow">https://wiki.aalto.fi/download/attachments/120460118/wifius16-proposal-public.pdf?version=1&#038;modificationDate=1494596154122&#038;api=v2</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/comment-page-1/#comment-1562116</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 09:41:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59029#comment-1562116</guid>
		<description><![CDATA[IoT Security Workshop
https://wiki.aalto.fi/display/sesy/IoT+Security+Workshop]]></description>
		<content:encoded><![CDATA[<p>IoT Security Workshop<br />
<a href="https://wiki.aalto.fi/display/sesy/IoT+Security+Workshop" rel="nofollow">https://wiki.aalto.fi/display/sesy/IoT+Security+Workshop</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/comment-page-1/#comment-1562010</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 07 Sep 2017 18:52:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59029#comment-1562010</guid>
		<description><![CDATA[Uusi tutkimuskeskus ratkoo robottiautojen ja drone-lennokkien tietoturvaongelmia
http://www.aalto.fi/fi/current/news/2017-09-07/]]></description>
		<content:encoded><![CDATA[<p>Uusi tutkimuskeskus ratkoo robottiautojen ja drone-lennokkien tietoturvaongelmia<br />
<a href="http://www.aalto.fi/fi/current/news/2017-09-07/" rel="nofollow">http://www.aalto.fi/fi/current/news/2017-09-07/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/comment-page-1/#comment-1562009</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 07 Sep 2017 18:51:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59029#comment-1562009</guid>
		<description><![CDATA[SELIoT: SEcuring Lifecycle of Internet of Things
https://wiki.aalto.fi/display/sesy/SELIoT%3A+SEcuring+Lifecycle+of+Internet+of+Things

The SELIoT (SEcuring Lifecycle of Internet of Things) project proposes to address the currently pervasive lack of IoT security by a comprehensive approach that spans the entire lifecycle of an IoT device. Security of typical IoT devices is glaringly inadequate despite the fact that these devices have an unprecedented access to sensitive data and/or ability to control the environment. While previous results considered specific vulnerabilities or focused on basic security issues (e.g., key management), this project takes into account the unique context of IoT systems: starting with initial deployment (birth), continuing through normal operation (life) and lasting until repurposing, caused by, e.g., ownership change or disposal.]]></description>
		<content:encoded><![CDATA[<p>SELIoT: SEcuring Lifecycle of Internet of Things<br />
<a href="https://wiki.aalto.fi/display/sesy/SELIoT%3A+SEcuring+Lifecycle+of+Internet+of+Things" rel="nofollow">https://wiki.aalto.fi/display/sesy/SELIoT%3A+SEcuring+Lifecycle+of+Internet+of+Things</a></p>
<p>The SELIoT (SEcuring Lifecycle of Internet of Things) project proposes to address the currently pervasive lack of IoT security by a comprehensive approach that spans the entire lifecycle of an IoT device. Security of typical IoT devices is glaringly inadequate despite the fact that these devices have an unprecedented access to sensitive data and/or ability to control the environment. While previous results considered specific vulnerabilities or focused on basic security issues (e.g., key management), this project takes into account the unique context of IoT systems: starting with initial deployment (birth), continuing through normal operation (life) and lasting until repurposing, caused by, e.g., ownership change or disposal.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/07/iot-security-workshop/comment-page-1/#comment-1562008</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 07 Sep 2017 18:50:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59029#comment-1562008</guid>
		<description><![CDATA[New research institute solves information security of robotic cars and drones
http://www.aalto.fi/en/current/news/2017-09-07/

Aalto University is a member of Intel Labs&#039; CARS research lab that tackles security and privacy challenges of autonomous systems.]]></description>
		<content:encoded><![CDATA[<p>New research institute solves information security of robotic cars and drones<br />
<a href="http://www.aalto.fi/en/current/news/2017-09-07/" rel="nofollow">http://www.aalto.fi/en/current/news/2017-09-07/</a></p>
<p>Aalto University is a member of Intel Labs&#8217; CARS research lab that tackles security and privacy challenges of autonomous systems.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
