Embedded Developer: November 2015

Page 1

Interview with Paul Pickle – President of Microsemi

ARM Delivers the Future of Authentication

Atmel START Development Tool

Safeguarding the

NOVEMBER, 2105

IoT

Microsemi Secures the World’s Embedded Systems


Your Guide to Embedded MCUs and Development Tools. embeddeddev Everything you’re looking for in one place.

w w w. e m b e d d e d d e v e l o p e r. c o m


CONTENTS

Embedded Developer

EDITORIAL STAFF Content Editor Alex Maddalena amaddalena@aspencore.com Digital Content Manager Heather Hamilton hhamilton@aspencore.com Tel | 208-639-6485 Global Creative Director Nicolas Perner nperner@aspencore.com Graphic Designer Carol Smiley csmiley@aspencore.com Audience Development Claire Hellar chellar@aspencore.com Register at EEWeb http://www.eeweb.com/register/

4 6 10 12 16 28

Published by AspenCore 950 West Bannock Suite 450 Boise, Idaho 83702 Tel | 208-639-6464 Victor Alejandro Gao General Manager Executive Publisher

34

NEWSWIRE On the Floor: The 2015 Altera SoC Developers Forum TECH TRENDS Tap Tap Tech: Screen Technology PRODUCT WATCH Inside the Lab Overview: DragonBoard 410c Atmel START Development Tool TECH REPORT ARM Delivers the Future of Secure Authentication INDUSTRY INTERVIEW Safeguarding the IoT Interview with Paul Pickle – President of Microsemi EEWEB FEATURE Littelfuse Helps Circuit Designers Protect Small Devices from Big ESDs

10

12

28

34

Cody Miller Global Media Director Group Publisher Glenn ImObersteg Publisher Embedded Developer, LLC

EEWeb

3

3


Embedded Developer

Newswire

2015 Altera

SoC Developers Forum

Audi A7 Sportback piloted driving concept 550 mile piloted drive from Silicon Valley to Las Vegas —Photo courtesy Audi

4


NEWSWIRE

The Altera SoC Developers Forum (ASDF) is a place for developers to connect and discuss the future of SoC FPGA technology. With the rising demands of new, complex applications that drive technological advancements, the face of the industry is undergoing a transformation. Data-driven applications are sustaining Moore’s Law at a healthy rate, but the development costs are soaring, preventing many from developing their own silicon. To combat these costs, heterogeneous computing—a combination of embedding processing accelerated by FPGA fabrics—is proving to be the best solutions in many different markets. This year’s ASDF event offered developers a chance to sit in on keynote addresses and lectures on the latest industry challenges and trends. From the computing systems behind selfdriving vehicles to high-end, wireless audio equipment systems—the event offered engineers a chance to see, first hand, the types of new and exciting applications that are directly benefiting from SoC FPGA systems. Bradley Howe, Senior VP of Altera, was at the event and spoke to EEWeb about some of the unique demonstrations he saw. “Audi’s keynote gave an overview of their prototype self-driving A8, which drove from the Bay Area to Las Vegas recently,” Howe explained. “[The car] aggressively employed auto-parking, lane changing, and auto-stop…the automotive industry has been a lot of fun to watch, especially if you are interested in cars.”

Click the image below to watch the full interview with Bradley Howe:

CLICK To learn more about the 2015 ASDF Event, visit: https://www.altera. https://www.altera.com/events/ com/events/northamerica/alteranorthamerica/altera-socsoc-developers-forum/overview. developers-forum/overview. highResolutionDisplay.html highResolutionDisplay.html

5


Embedded Developer

TapTapTech

SCREEN

Technology

By Josh Bishop

6


TECH TRENDS

I

n this edition of Tap Tap Tech, we’re going to discuss screen technology. In my own, personal claim to fame, the first all electronic

television was invented by a family member – my great grandfather’s cousin, Philo T Farnsworth. In 1927, at the age of 21, Philo successfully demonstrated the basic underpinnings of the cathode ray tube television, which begs the question—what have I done with my life?

Sponsored by

7


Embedded Developer

Anyway, cathode ray tube displays have been slowly fading out of use over the last decade but it had been the undisputed leader for over eighty years, though with many improvements in that time. Now, though, flat screens have dropped significantly in price and are everywhere as computer monitors, television screens, phones, watches— basically everything that needs to display information. But the new flat screens operate on a significantly different principle than the old style CRT and there is even quite a bit of difference how the flat screens work among themselves. CRT screens basically shot an electron gun at a phosphor-coated screen. The electron gun shoots the electrons, an electromagnet around the gun steers the electrons to hit the appropriate place on the screen, causing the phosphor to glow. LCD screens, on the other hand, are simply a matrix of red, green, and blue dots that, depending on whether or not a voltage is flowing through them, allows light through them. Now, I’ve noticed a lot of confusion between LCD displays, LED displays, and OLED displays. So, let’s get this straight. LCD displays, in all their forms, are backlit. The LCD portion simply allows

8

the backlight through or blocks it—it doesn’t create any light. When you hear about LED displays, they’re talking about switching the backlight from fluorescent bulbs to LED. This, in general, gives a more even lighting and is more energy efficient, but that’s about it. OLEDs, on the other hand, are completely different. The sources of color are the same sources, they’re basically grids of incredibly small, colored LEDs. This means that when you want black, you turn off the light source instead of trying to block it, meaning much darker blacks. They’re also more energy efficient, allow thinner screens, feature fantastic viewing angles, have orders of magnitude faster refresh rates than LCDs, are easier to flex, and have actually dropped in price to merely extremely expensive levels instead of insanely expensive. This may be an incredibly brief overview of screens, but it’s obvious that screens have come an incredibly long way from their inception and that both size and resolution are not everything. And while I am currently highly impressed with OLED displays, I will admit that in twenty years, I’ll probably laugh at this clunky, outdated technology compared to the incredible images our overlords transmit directly into our brains.


Your Circuit Starts Here. Sign up to design, share, and collaborate on your next project—big or small.

Schematics.com Click Here to Sign Up


Embedded Developer

INSIDE THE

LAB

Inside the

LAB

DragonBoard 410c Inside the Lab is a webseries sponsored by Arrow Electronics dedicated to exploring the latest in technology and electronics. In this episode we’ll introduce you to Arrow’s DragonBoard 410c, a development board for Qualcomm’s Snapdragon 400 series of SoCs.

Sponsored by Arrow Electronics

10


PRODUCT WATCH

THE DRAGONBOARD 410C OPERATES ON ANDROID AND LINUX, WITH PLANNED SUPPORT FOR WINDOWS 10, SO THE USER CAN DEVELOP FOR ALL THREE PLATFORMS USING A SINGLE HARDWARE PLATFORM. The DragonBoard complies with the 96boards consumer edition specification and is based on the Snapdragon 410, which features a quad-core ARM Cortex A53 running at up to 1.2 GHz and a Qualcomm Adreno 306 MHz GPU. The Cortex A53 is capable of running 64- and 32-bit code, and the Adreno GPU offers support for OpenGL 3.0 ES, OpenCL, and DirectX. Additional features include an integrated ISP supporting up to 13MP cameras, and playback and capture of 1080p/30fps video. The SanDisk eMCP supplies 8GB of eMMC for storage and 1GB of DDR3L memory, and the Qualcomm WCN3620 and onboard antennas provide GPS, Bluetooth, and WiFi connectivity. Expansion options include a high-speed connector, a low-speed expansion connector, and an analog expansion connector. Connectivity includes a microSD slot for storage, USB on-the-go, USB, and HDMI, with connectors from FCI.

The DragonBoard 410c operates on Android and Linux, with support for Windows 10, so the user can develop for all three platforms using a single hardware platform. Arrow’s DragonBoard 410c brings a tremendous amount of processing power and integrated connectivity in a tiny footprint and is great for developing nearly any embedded or maker project you can imagine. For more information, as well as video demonstration of the DragonBoard 410c, visit “arrow. com”: https://www.arrow.com/en/ research-and-events/videos/insidethe-lab-dragonboard-410c.

CLICK CLICK 11


Embedded Developer

Atmel

START

Intuitive Online Tool for Embedded Software Projects Atmel START is a web-based, code configuration engine that helps users graphically configure and deploy embedded software, low-level drivers, middleware example applications, and reference designs.

12


PRODUCT WATCH

13


Embedded Developer

Atmel developed this tool to help

users configure their MCU projects that take the foundational code that typically takes up so much of the development time. With this web-based tool the user can choose an MCU and select I/Os, choose clock parameters, and add potential peripherals, and it will automatically create the code. This will jumpstart the process for developers by eliminating the arduous code generation process at the beginning of most MCU projects. Through the Atmel START tool, you can go through three steps in the project creation process. First, you can select a pre-existing or custom board from Atmel’s catalog. In this step, Atmel offers

detailed information for each board so the user can familiarize themselves with the different parameters and ideal uses. Atmel START also offers example projects for the user to see a project in its final stages to see the process from start to finish. These sample projects can also be reconfigured for other boards, so the user can see how a similar project would turn out with a different board selection. Once Atmel START project loads the pads, pins, and modules, it will appear on a graphic user interface for further editing. By using the dashboard, the user can select different aspects of the MCU operation for more detailed editing. The tool also allows you to add a software component to look

Pin configuration

14


PRODUCT WATCH at code generation and peripheral setup. Virtually every aspect of the project can be edited through an advanced GUI interface, such as pin designation and component add-on functionality. Once all the parameters are selected, the user can export the software components in a pack. Since the Atmel START is an online tool, each step of the process can be added to the cloud, which allows for remote teams to work on the same project no matter where they are. It also saves the project at every step of the process so the engineer can retrace their steps and find the source of any problems that may arise. Atmel painstakingly researched, tested, and

developed ways to ensure the MCU development process is streamlined, so engineers can get an easier start to the project and boost time to market for any type of design. Click the image below to watch a video demonstration of the Atmel http://www.eeweb.com/blog/ START Tool: http://www.eeweb.com/ eeweb/atmel-start-overview blog/eeweb/atmel-start-overview

CLICK

VIRTUALLY EVERY ASPECT OF THE PROJECT CAN BE EDITED THROUGH AN ADVANCED GUI INTERFACE, SUCH AS PIN DESIGNATION AND COMPONENT ADD-ON FUNCTIONALITY.

Code generator

Clock configurator

Add software components

15


Embedded Developer

Securing the Future of

Authentication ARM delivers the hardware foundations for simple and strong authentication By Rob Coombs, ARM

16


TECH REPORT

In 2014 ARM’s silicon partners shipped more than 2-billion ARM® Cortex®-A processor based applications into phones, tablets, DTV and other smart connected devices. These devices are increasingly being used to access cloud-based services and for highvalue use cases such as payment and handling of corporate or government information. To protect system assets from attack, modern ARM platforms use a combination of technologies: from the Cortex core Hypervisor mode, to the ARM TrustZone®-based TEE and tamper proof security processors or secure elements protected with ARM SecurCore® processor IP. This multilayered or compartmentalized approach increases overall system security and provides the right level of protection that goes beyond the operating system to the different assets within a mobile device.

17


Embedded Developer

The TrustZone based TEE was designed to deliver enhanced security from scalable software attacks and common hardware attacks (so called shack attacks) at a lower cost to the market. Its architecture provides isolation between the normal world (Rich Operating System and Applications) and a hidden secure world that can be used for sensitive operations such as crypto, key management and integrity checking. It has become an important hardware security layer for device manufacturers that they have been developing and standardizing over the last ten years to protect valuable system assets. The TEE is standardized by GlobalPlatform, click here for linkwho have created a compliance and certification program so that independent test labs can check that platforms are protecting against the threats identified in the protection profile. GlobalPlatform have white papers click here for link discussing the TEE: this white paper has been written to add information to their documents covering the FIDO use case and ARM TrustZone technology. The move to password-less login using biometric authenticators is being accelerated through standardization by the FIDO Alliance. FIDO protocols such as Universal Authentication Framework (UAF) enable local user verification with multiple authenticators such as fingerprint sensors, iris scanners or PIN entry replacing the traditional username and password. It is often said that security is a chain where security relies on a sequence of

18

linked processes. Using this analogy, the first link is secure hardware that can be isolated using TrustZone technology from the normal world rich execution environment and be the basis for trusted boot. Trusted boot initializes the Trusted OS and therefore the TEE before booting the normal world OS. With the TEE established, a FIDO Trusted App can be provisioned to look after key material, crypto and other sensitive operations. This document looks at why the TrustZone based TEE architecture is an excellent fit to the FIDO security requirements and its role as the de facto base-line security technology used in smart devices with integrated authenticators.

The FIDO UAF Password-less Experience The consumer with a FIDO enabled smart device can register once with their favorite online shopping site or bank. During the registration process the device creates a public and a private key that is specific to the combination of user, his/her device and the relying party. Subsequent visits to the online store then become much easier for the consumer as they can replace the usual username/password authentication step or confirmation of purchase with a quick swipe of a finger or entering a simple and memorable PIN code [Fig 1]. No common user information is shared by the FIDO protocol as its implementation cannot leak private user information. As the relying party only holds the public key it cannot be used directly by hackers to take over accounts if the


TECH REPORT website’s servers are hacked (currently a major problem in the industry).

Overview of FIDO and the FIDO Alliance The FIDO alliance comprises more than 180 members covering the whole value chain from major silicon partners (such as Qualcomm), device manufacturers (such as Samsung and Lenovo), operating system companies (such as Microsoft and Google), FIDO server providers (such as Nok Nok Labs) and relying parties (such as Bank of America and PayPal). It develops technical specifications and certification programs to fulfill its mission to enable simpler, stronger authentication. FIDO protocol design is driven from a desire to improve the ease of use of authenticators, built-in privacy, security by design and drive standardization so that relying parties can use any FIDO compliant authenticator. Final FIDO 1.0 specifications are availableclick online here and comprise of two alternative user experiences: Universal Authenticator Framework (UAF) provides a passwordless experience for devices such as smartphones with built-in authenticators and Universal 2nd Factor (U2F) for a

dongle that helps protect traditional username/password against phishing attacks. Work is ongoing to have a unified standard for FIDO 2.0. Relying parties have been using username and passwords for years but it has proven to be unsatisfactory to both consumers and businesses as passwords have many problems. Consumers like to choose weak passwords or reuse them across websites making it easier for hackers to take over accounts. If they are forced to choose complex passwords, they forget them and transactions may be abandoned. Worse still, passwords are easily phished by scam emails allowing financial fraud on a massive scale: to take one example, Kaspersky click here estimates that a phishing gang stole $1B from a number of banks last year. Businesses sometimes require use of a second factor such as a One Time Password (OTP) token that typically provides a code to be used alongside the username/password. The often proprietary nature of these tokens has filled consumer’s pockets and drawers with hardware: you might have one OTP token for your bank, another for your work email and others for other service providers. Another issue for relying

No common user information is shared by the FIDO protocol as its implementation cannot leak private user information.

Fig. 1. A simple FIDO user experience

19


Embedded Developer

The TrustZone security extensions work by providing the processor with an additional ‘secure state’ that allows secure application code and data to be isolated from normal operations.

20

parties using traditional authentication is the need to hold private keys for each customer. These massive databases of credentials create a “honeypot” for hackers who can steal millions of consumer’s individual credentials with a single well designed attack. This creates reputational risk for big brand companies who may have to admit to a security breach and ask its customers to quickly reset their passwords.

is generated on the device for every combination of user/device/relying party. For an overview of the FIDO 1.0 specifications please seeclick here.here

FIDO mitigates the problems with traditional usernames and passwords and creates a more delightful consumer experience at the same time. For example, on a modern Samsung Galaxy device it is possible to log onto websites or pay for things using your fingerprint. This simple user experience is enabled by FIDO UAF protocol replacing the username/password with a built-in authenticator such as a fingerprint sensor that unlocks a private key on the device that is used in a crypto challenge with the remote server (which holds the public key). The relying party also gains metadata providing some basic information such as the type of authenticator, key protection mechanism used and model of device that can be used in back-end risk analysis. However, no biometric, PIN information or private key is exchanged with the online server. This “Privacy by design” aspect of the FIDO protocols provides added protection to the consumer who is less likely to be troubled by security breaches of the stores’ server. The crypto challenge is based on well-established Public Key Cryptography principles involving the use of a public/private key pair that

3. To maintain the confidentiality and integrity of sensitive processes

The FIDO security requirements can be summarized as: 1. To ensure the integrity of the device 2. To keep key material confidential from unauthorized access

Threat Landscape Attacks on devices can come in many forms, from malware to social engineering, theft or physical loss of the device, or improperly secured devices either through misuse or by users jail-breaking their devices. Attacks can be performed by many different methods, and malicious software can be installed by conventional means such as through a rogue app store, via social engineering, trojan or by other attack vectors such as via the browser. When malware is present on a device it has the potential to escape its sandbox or process permissions and any data held or input into the device can then become compromised. Alternatively, if an attacker can gain physical access to the device, further attacks become possible. If the attacker can access the file system of the device, they can potentially


TECH REPORT steal data. If the data is encrypted, the attacker could copy the data off the device and perform an offline attack on the encryption. Whilst software attacks are often the main threat, it is important to remember that physical attacks such as opening the device and probing the board become possible if the attacker possesses the phone. The design of security architecture conventionally relies on two basic concepts: the principle of least privilege, and the partitioning of the system into protected compartments. For example, the TrustZone based TEE is normally designed to maintain its isolation even if the Normal World has been compromised. A malicious hacker may take over the Normal World and spy on communications to the TEE, but the Trusted World will retain its integrity and confidentiality.

TrustZone and the Trusted Execution Environment GlobalPlatform standardizes the TEE [Fig. 2] and generates specifications, compliance programs and certification schemes. They have created white papers providing an insight into the TEE and how it can provide confidentiality and integrity for services such as payment, content protection and dual- persona devices. For the purposes of brevity, only a short description is provided here. A TEE provides a secure enclave to protect sensitive code and data with the security promises of integrity and confidentiality, for example, a malicious application should not be able to read

the private keys stored on the device. The TEE is designed to protect against scalable software attacks and if someone has stolen your device, from common hardware attacks sometimes referred to as “shack attacks” (attacks from a knowledgeable attacker with access to normal electronic enthusiast type of equipment). The TrustZone-based TEE provides a “Secure World“ where the security boundary is small enough to offer a route to certification and provable security. It is typically used for securing cryptographic keys, credentials and other secure assets. TrustZone offers a number of system security features not available to the hypervisor: it can support secure debug, offer secure bus transactions and take secure interrupts directly into the Trusted World (useful for trusted input). There is an argument to restrict the amount of security functionality in the trusted world to limit the attack surface and make certification a practical proposition. The TrustZone security extensions work by providing the processor with an additional ‘secure state’ that allows secure application code and data to be isolated from normal operations. This partitioning enables a protected execution environment where trusted code can run and have access to secure hardware resources such as memory or peripherals. Conventionally, the Trusted World is used with its own dedicated secure operating system and a trusted boot flow to form a TEE that works together with the conventional operating system, such as Linux® or Android™, to provide secure services.

21


Embedded Developer

Fig. 2. TrustZone can provide the hardware partitioning for a TEE and access to secure resources

22

Security is as strong as the weakest link in a chain of trust. The starting point of the chain is the Root of Trust (ROT) that is normally implemented in hardware to protect it from modification. Mobile device integrity starts by resetting into Secure World and booting from immutable hardware in the form of a Read-Only Memory and accessing trusted hardware resources such as hardware unique key, random number generators, counters, timers and trusted memory. A carefully designed authenticated trusted boot flow is the basis for device integrity. The Trusted OS is started as part of the trusted boot flow before the Normal World Rich OS is booted.

Specific Role of the TrustZonebased TEE in FIDO Implementations The TrustZone (Secure World) based authenticated trusted boot flow and hardware ROT provides the basis for device integrity (a reference implementation of trusted boot can be found here). The Trusted OS can provide click here trusted services for the FIDO protocol, for example, handling cryptography and user matching algorithms in a hardware protected execution environment. In a typical implementation, nearly all of the FIDO stack will reside in the normal world and only small security sensitive functions are moved into the TEE. The


TECH REPORT code moved to the TEE is referred to as a Trusted App as it benefits from the security promises of confidentiality and integrity. This partitioning builds in resistance to scalable attacks. A major use case of the TEE is to provide a secure key store. Since nonvolatile memory is rarely found on an applications processor, FIDO keys are encrypted in the TEE with a hardware unique key burned into the chip. This encrypted and wrapped key is then stored in external memory for storage between boots. Keys would only be decrypted and used within the TEE and never accessible to the Normal World. A FIDO Trusted App could include the functionality for biometric template storage and matching. This could be handled in a similar way to the storage of crypto keys i.e., encrypted and wrapped within the TEE and stored in external non-volatile storage. The TrustZone-based TEE provides solutions to the FIDO security requirements: 1.

To ensure the integrity of the device: This is achieved using hardware roots of trust and a TrustZone isolated authenticated trusted boot process.

2. To keep key material confidential from unauthorized access: 3. The system-wide hardware isolation provided by the

TrustZone architecture extensions enables a small, security certifiable TEE to handle key materials. FIDO keys can themselves be encrypted using strong cryptography and fused Hardware Unique Keys. 4. To maintain the confidentiality and integrity of sensitive processes: The TEE provides the security promises of integrity and confidentiality. Typically, small parts of the FIDO process will be statically partitioned into the Trusted World and run as a Trusted Application. Please see the Future enhancements section for future devices with a Trusted User Interface (TUI). 4. To maintain the confidentiality of sensitive input data: TrustZone enables interrupts from input devices (such as authenticators) to be steered directly to the Trusted World where trusted device drivers can handle them. For example, the TEE can handle touch events from a touchscreen during PIN capture or interrupts from a fingerprint sensor and separate it from malware in the normal world that would not be able to intercept it. When the PIN capture or other input is complete the interrupts can be switched back to the normal world.

A FIDO Trusted App could include the functionality for biometric template storage and matching.

23


Embedded Developer

5. Protection of sensitive display data: TrustZone can be used to protect a Trusted World frame-buffer and its composition. This enables a “what you see is what you sign/buy” feature since the frame-buffer cannot be intercepted, modified or obscured.

Future Enhancements GlobalPlatform has developed a protection profile for the TEE that is being used as the basis for a security certification program. Multiple test labs are establishing programs to test platforms and evaluate the effectiveness of the TEE they contain. Independent testing will assure device manufacturers of the quality of solutions that may be beneficial to the whole value chain. Security certification is expected to be available from the second half of 2015. Modern ARM-based chips are making increasingly sophisticated use of TrustZone technology. One example is the use of a TUI to protect touchscreen inputs and the display of protected frame buffers [Fig. 3]. It is possible

24

to have peripherals that can switch between normal world and secure world: the touchscreen and display are examples where this might be beneficial. In PIN capture mode the TEE may want exclusive trusted access to the touchscreen which can be returned to the normal world when PIN capture is finished. The Display Processor may be acting as a compositor for the various graphics layers and required to display trusted data from the Secure World to ensure “what you see is what you get/sign”. Trusted display data can be generated in a (TrustZone) protected frame buffer and composed as a secure layer with protection against overlay. Adoption of the TUI is expected to increase when standardization from GlobalPlatform is completed. In addition to the TrustZone-based TEE, a modern mobile device may have a number of secure elements owned by different parts of the value chain. The SIM card may be owned by the operator, the OEM may have its own SE and the OS may require access to a SE for holding keys or performing


TECH REPORT system integrity checks. As secure elements do not have access to an input method or display it can be beneficial to establish secure communications with the secure element from the TEE. GlobalPlatform is working on the standardization of communication between a secure element and the TEE.

Conclusion

In the future we can expect further improvements. Device manufacturers and silicon partners will have the option to have their TEE’s security certified by independent test labs. We can also expect TrustZone technology to be extended to cover touchscreen input (for protecting PIN entry) and display output providing a “what you see is what you sign/buy” capability.

The TrustZone-based TEE delivers effective system security at low cost for FIDO implementations. A well-designed TEE provides a suitable level of security for FIDO based implementations and is a huge improvement over the username/password normal world methods it is replacing.

FIDO based authentication is already deployed at scale and looks set to become an industry success story by helping consumers move beyond passwords. The TrustZone-based TEE demonstrates that when security is well architected it can deliver delightful user experiences.

It is possible to have peripherals that can switch between normal world and secure world: the touchscreen and display are examples where this might be beneficial.

Fig. 3. TrustZone-based TEE with FIDO Trusted App, Trusted User Interface & encrypted channel to a secure element.

25


MYLINK


MYLINK


Embedded Developer

28


INDUSTRY INTERVIEW

Microsemi Secures World’s Embedded Systems New Security Solutions Safeguard IoT Vulnerabilities Interview with Paul Pickle – President of Microsemi Microsemi is a global, broadline supplier of semiconductor solutions. The company has roots in the aerospace and defense markets—areas that require high-reliability solutions. Recently, the company has made significant strides leveraging their core competencies in the communications sector, as more and more devices become interconnected. Microsemi’s value proposition of low power, security, reliability, and performance has proven to be beneficial for securing the Internet of Things (IoT), which has been widely overlooked in its development stages. EEWeb spoke with Paul Pickle of Microsemi about some of the key security hazards and vulnerabilities within the IoT and what the company is doing to secure it.

29


Embedded Developer

We were investing in security knowing that it was going to become critically important in the future. How does Microsemi’s experience working in the military and defense industries help in the migration towards the IoT to help stop data breaches? Security is a big-picture view that we value. If you think in terms of threat mitigation, it doesn’t come down to one particular aspect like encryption, software, or hardware. It really comes down to taking a holistic view—security has been a big issue the past five years, but there hasn’t been a real appreciation for what exactly that means. We were investing in security knowing that it was going to become critically important in the future. The military and defense contractors certainly understand the importance of security and our work with government agencies in terms of cryptographic techniques and countermeasures gives us a great knowledge base to apply to IoT. Physical, software, and encryption capabilities were imperative to our operations in the military fields, and then we began looking at component exploits and we realized there was work that needed to be done in terms of making sure there were fewer attack vectors. We previously built all of these tools that our customers could use as one-offs, but we started recognizing that the rest of the world needed somebody to bring a more holistic view to security—it couldn’t be an afterthought, which is typically how it had been done in the past.

30

Do you believe the IoT has brought these security issues to the forefront? It definitely has. People view the IoT as a new emerging trend, but connected devices have been out there for quite awhile. While we haven’t always called it IoT, when you look at the number of deployed connected devices in the industrial space, it is a staggering amount. Our security issue is that we have been designing systems for intended functionality for years, but we are just now starting to become fully aware of what happens if we purposefully command a system to do something that was not intended. For example, putting an assisted “Park” function in a car sounds like a great idea, but when they were designing those systems for the car, they never really thought about someone maliciously using the assisted “Park” function in order to make the car to do an abrupt left turn traveling down the highway. While there are lots of protection mechanisms to make sure the system doesn’t malfunction like that under normal operation, nobody ever really thought about a scenario where someone intentionally circumvented the protections in order to make something unintentional happen; if they did, they would have designed things differently.


INDUSTRY INTERVIEW As we become more dependent on the IoT, the liability of these security issues grow exponentially.

Even if companies begin to focus solely on security when developing IoT, do you think they can ever be completely secure? We don’t know what we don’t know. Hacking is an innovative process at the heart of it—you can design a system and someone will find a way around that system. Theoretically there are elements of security that seem completely secure like some cryptographic schemes because the numbers are so large it would take computers forever to find a key by brute force, but they are meaningless if the key can be easily extracted by other means. For example, we had a researcher in England who claimed to have found a backdoor in one of our devices using a form of a technique called side-channel analysis to extract a cryptographic key. The device had been on the market for about ten years and was frequently used in military systems and missiles because of its security features. In this device Microsemi utilizes two keys—one is a key that the user chooses, and the other is set at our factory. While it wasn’t really a backdoor that could be used by any one entity to circumvent a user’s device that was accessed, if a user had both keys they

could gain access to a test facility on the chip. Obviously we never intended for an unauthorized user to gain access to the factory key, but the researcher found that he could extract it given enough time and physical access to the device using a newly developed piece of technology. In reality there were other security modes that the device could be put in to thwart the hack, but he did demonstrate that newer technology could circumvent older technology. The point is that ten years ago we didn’t envision side-channel analysis as a possible method to extract keys, and while our latest devices are protected against this type of attack it demonstrates that Cyber security and cyber threats will end up progressing and become sophisticated enough so that what we develop today can be circumvented down the road, so it is really hard to say that something will be 100-percent secure. In addition, IoT devices have inherent security disadvantages: they have power budgets, computing budgets, and cost budgets. If a device is on the very edge of the network that is taking sensor input, they do not have a whole lot of computing power that can be dedicated to security functions. If they are a sensor function, they have to be cheap, meaning that the budget allocation won’t all go to security features. It is impractical to think that a device

Cyber security and cyber threats will end up progressing and become sophisticated enough that what we develop today can be circumvented down the road...

31


Embedded Developer

One glaring problem with standards is that once you define one, people will know how you approach security and start looking for ways around it. like that will be completely secure and unhackable, which means that the mesh network connected to it will always have to test the messages that are being sent back from whatever is connected to it.

Could you tell us about the Security Center of Excellence (SCoE) and its initiatives? It is a daunting task to approach security, and if we are going to drive secure solutions going forward, we have to bring everybody together to look at the problem a little differently. An ideal goal should be to build devices with security as one of the goals as opposed to just intended functionality. The other part of threat mitigation is we have to think in terms of assuming that somebody can get into the system or onto your network. Given that, we have to take the approach mitigating threats on a real-time basis. We want to approach the problem a little bit differently. The SCoE is about taking all of the tools we have developed over the years in all different areas— software, hardware, and system—and provide a service that is essential to implementing security standards. One glaring problem with standards is that once you define one, people will know how you approach security and start looking for ways around it. We are putting together sets of standards with

32

the services that we provide in order to drive security in the right direction. It is tough to convince people that they need to pay for a preventative measure, but I think it will soon become obvious that this is something we need. As we engage with customers, we end up making better products and offering better services. More importantly, it will push IoT devices past the threats that are already becoming apparent. We offer threat penetration testing to determine if a client’s product is vulnerable and work with data engineers to make sure the client’s devices are as safe as possible. Threat mitigation is something we already do, so it is really a matter of taking what we have learned, commercializing it, and making it cost effective enough to bring to a broader market. Customers have to understand that they need security and I stress that because there is a cost component, which can be a deterrent at first. Security is a capability that we have, not necessarily a product, so we have to engage with our customers to understand what solution is right for them.

Do you have any plans in the future to expand the SCoE? The SCoE serves primarily as an educational center for customers. However, we will absolutely continue


INDUSTRY INTERVIEW our own R&D efforts to build better products with security built into them. To make security threats mitigation better. I expect that through the SCoE, we will have recommendations that will include Microsemi products, but remember that security solutions is an independent service that we provide. If participants want us to tell them how to make someone else’s components or systems better, we will absolutely do that. There are even certain techniques that they can employ to implement security without adding additional components. A critical thing to mention is Root of Trust, which is something that not a lot

of people address very well. We are going off and looking specifically at physical uncloneable function (PUF) or similar techniques that would give systems a unique fingerprint. This is something that we should be able to develop cheaply enough in high-volume components. With that, we can enable systems to be recognized as trustworthy. Trusting the identity of connected systems would go a long way for security, though we still have to make sure that the software is not compromised. If it is not an afterthought, I think we can continue to drive in a direction where we economically provide solutions at the right level of security.

We offer threat penetration testing to determine if a client’s product is vulnerable and work with data engineers to make the client’s devices are as safe as possible.

33


Embedded Developer

Littelfuse Helps Circuit Designers Protect Small Devices from

Big ESDs

34


EEWeb FEATURE

T

hough the value of good protection is becoming a more common consideration in the minds of circuit designers these days, it wasn’t long ago that the circuit protection industry still had a lot of work to do in proving its worth. Thankfully, things have certainly improved, and much of the progress has been led by major protection component providers like Chicago’s Littelfuse, Inc. But, as the company’s representatives imply, there’s still a lot for the field to accomplish in making devices more reliable through better protection from a host of unpredictable electrical forces.

35


Embedded Developer

WE THINK IT’S VERY IMPORTANT TO HAVE OUR SIGHTS ON FUTURE TECHNOLOGIES THAT WILL BE APPLICABLE TEN TO FIFTEEN YEARS OUT SO WE ARE BEST PREPARED TO SERVE OUR CUSTOMERS’ CIRCUIT PROTECTION AND POWER CONTROL NEEDS.

Today, when stalwart companies like Littelfuse define themselves by a focus on circuit protection, most engineers still think only of basic protection components like fuses and breakers. But the company’s advanced approach to the technology of protection has taken them surprisingly far, not only in standing at the top of the traditional protection component market but in developing and marketing advanced, semiconductor-based protection devices for the complex and demanding standards of a world run by an increasing variety of microprocessors, systems-onchips (SoCs) and other delicate chipsets. With more than a decade in circuit protection and five patents to his name, Chad Marak, Director of Semiconductor Business Development at Littelfuse, clearly thinks a little bit differently than the average engineer. Joining Littelfuse as an analog design engineer in 2007, Marak’s current responsibilities include strategizing the growth of some of the company’s protection product lines and seeking out new technologies to invest in for future growth. He received his BSEE at Texas A&M University before continuing his education. Marak has been involved with introducing the details of circuit protection, still a field that is not covered extensively in traditional electrical engineering programs, to a whole new generation of engineers through a series of educational engagements including one at his alma mater. “As the microprocessor chipsets become smaller and faster, it’s important for engineers to understand the critical value

36

and importance of circuit protection, specifically at the board level to protect more sensitive systems,” company representatives outline. Marak echoes this, saying that “around fifteen years ago, it was much more difficult to convince people that circuit protection from things like electrostatic discharge was an important priority. As processors have become more complex in the era of SoCs, and as the undesirable results of marketing unprotected circuits have certainly made themselves known, the obvious importance of circuit protection has become much more widely known and now stands as a big concern for designers.” With next-generation protection now taking a bigger role in the design process, Littelfuse five to ten years out continues to develop an impressively thoughtful approach to making the most of what the circuit protection industry has to offer. Being an engineer himself, Marak also feels that he brings a knowledge of products and the state of current developments in the field to the table, which allows some unique insight into where the company’s efforts might best be invested to keep them at the forefront of protection. “We think it’s very important to have our sights on future technologies that will be applicable ten to fifteen years out so we are best prepared to serve our customers’ circuit protection and power control needs,” he explains. It may seem like a particularly new technology on the rise, but in fact, Littelfuse first entered the semiconductor protection market in


EEWeb FEATURE the late 1990s. Today, the company continues to look at the future of circuit protection increasingly on the silicon device level, as well as on keeping pace on the level of familiar passive protection components. Providing a host of what Marak refers to as advanced “overvoltage protection components,” the main product lines at Littelfuse are all differentiated by application, by the level or type of transient they are meant to protect against, and by some other basic design aspects, giving the company an unusually diverse roster of options from which designers can choose. First, Marak details, is the company’s updated take on the TVS diode, which provides essential surge protection for almost any kind of electronic device that consumes power. “As a transient comes down the line, the possibility of an overvoltage event is mediated by the diode, which is triggered and shunts any excess power to ground,” he explains, pointing out that “these components are a bit bigger relatively speaking and ultimately designed to handle a general variety of threats that electronic equipment experiences on a daily basis.” TVS diode arrays, on the other hand, which represent the next distinct line of components from Littelfuse, are “very small form-factor designs, on the order of tenths of millimeters, which allows Littelfuse to offer devices as small as 0.45x0.25mm.” These devices, Marak says, are more specifically geared toward protection from the specific threat of electrostatic discharge (ESD), and designed to meet some of the most demanding form-factor requirements in the market. “ESD is a very short-lived transient with a very high voltage,” he describes, “and can be very damaging to the common integrated circuit (IC) in an increasing number of everyday devices.”

iDesign Tool HELPING SAVVY DESIGNERS PROTECT AGAINST ESD Most electronic devices include ESD protection circuitry to guard against ESD events the device can be expected to encounter. Typically, the design engineer selects these ESD protection devices based on the rated protection voltage listed on the data sheet, includes the part in the design, and everything is fine. But sometimes a device will fail ESD testing at a voltage lower than it is rated for, or maybe a customer experiences an ESD failure. This often leads to frustration and confusion with little or no answers to the question: “Why did the ESD protection fail?” The answer is not always simple, but Littelfuse has incorporated comprehensive simulation capability into their iDesign ESD selection tool. The data presented is not based simply on data sheet specifications. Rather, it is based on the selected protection device paired with the user-supplied system and device information to provide a true protection rating; in essence creating a dynamic data sheet for each part in any given situation. By partnering with Pragma Design to ensure the quality and accuracy of its ESD device models, Littelfuse provides designers with a platform to quickly determine, compare, and select the appropriate ESD protection device for their design. Click the image below to watch an overview of the Littelfuse iDesign Tool.

CLICK 37


Embedded Developer

Littelfuse also leads in the supply of what are known as protection thyristors, or SIDACtor® devices, which are generally associated with telephone and communication lines. These products help protect telecommunication networks from the threat of nearby lightning strikes, which can induce surges or transients into the wiring. The company also backs those silicon device lines up with a comparably wide selection of traditional, passive overcurrent protection components, like fuses. Naturally, these components have to be there, not only to protect the electronics themselves but also to protect the consumer from potential electrical events with Li-ion batteries, which are found in an increasing number of devices in the era of the Internet of Things. With the future situated demonstrably well in their sights so far, Littelfuse seem to have a successful formula for looking ahead at every turn. “More recently, Littelfuse is also putting some effort into what we’re calling ‘power control,’” Marak reveals, “which we mean to differentiate from the idea of power management in the familiar sense.” When they say “power control,” he distinguishes, “we mean the switching of currents or the controlling of power flow one way or another, inside of a piece of equipment, motor, etc.” It’s not circuit protection at its core, he admits, but, it is an area where Littelfuse has expertise by virtue of their thyristor product line and looks to expand in this market over the coming years.

38

Beyond their many component innovations, Littelfuse also offers designers the use of a unique online design platform called iDesign, in which engineers can enter key parameters of their own designs and be conveniently guided through the process of identifying the best protection options for their products, including live simulation and detailed data analysis. As Marak describes it, iDesign definitely offers a level of both attention and independence otherwise unavailable in the circuit protection market. Ultimately, it’s precisely that willingness to provide service at every level that defines Marak’s impression of the Littelfuse ethos. “We had an international customer that was struggling to achieve the proper level of ESD protection for a very delicate chipset, something that required some very specific attention to detail,” he recalls. By applying their unique talents, Marak describes, “we ultimately worked with them to build an entirely custom part and were able to solve an issue that otherwise had no readily available solution in the market.” Considering that, it’s no surprise to find that Littelfuse offers individual service to just about any kind of customer, even to those inclined to do their own independent research. “In addition to basic application guides available on our website,” Marak highlights, “Littelfuse offers what we call the ESD Suppression Design Guide, which is just one of a number of design guides that we offer to those interested in learning some of the basics of circuit protection in regard to applying them to


EEWeb FEATURE their own designs.” The company also offers sample kits that include advice and options geared toward certain applications for all of their product lines, developed to help engineers streamline the process of choosing from among thousands of possible components. All in all, it’s precisely this kind of outlook that has undoubtedly brought Littelfuse to the leading edge of today’s newest protection technologies, Marak suggests. “We think it’s fair to present ourselves to our customers as knowledgeable in an unusually wide variety of products, applications, and processes, and we believe we can help customers to make the most informed decision about which protection component is best for their products,” he sums up. With the experience to make the call and the evidence at hand, it’s certainly not hard to believe him.

C Electrostati c Suppressio Discharge (ESD) n Design Gui de

“IN ADDITION TO BASIC APPLICATION GUIDES AVAILABLE ON OUR WEBSITE... LITTELFUSE OFFERS WHAT WE CALL THE ESD GUIDE ESD SUPPRESSION SUPPRESSIONDESIGN DESIGN GUIDE...”

39


M o v i n g To w a r d s a

David Elien VP of Marketing & Business Development, Cree, Inc.

Clean Energy

Let There Be

LIGHT

FUTURE

How Cree reinvented the light bulb

— Hugo van Nispen, COO of DNV KEMA

Cutting Edge

SPICE

Modeling

MCU Wars 32-bit MCU Comparison

+

Cutting Edge Flatscreen Technologies

+

New LED Filament Tower

View more EEWeb magazines— Click Here Click here

Power Developer O ct o b er

201 3

From Concept to

Reality

Sierra Circuits:

Designing for

Durability

A Complete PCB Resource

Wolfgang Heinz-Fischer Head of Marketing & PR, TQ-Group

TQ-Group’s Comprehensive Design Process

Freescale and TI Embedded Modules

+

Ken Bahl CEO of Sierra Circuits

PLUS: The “ Ground ” Myth in Printed Circuits

+

+

PCB Resin Reactor

ARM Cortex Programming

Low-Power Design Techniques


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.