SlideShare a Scribd company logo
Building Secure
Connected Devices
Kedar Sovani
Who am I?
• IoT @ Marvell for 7 years
• 1st
Apple HomeKit SDK, 1st
Google Weave on μC
• Powering millions of Wi-Fi
IoT devices in the field
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Anywhere and Everywhere
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Google for the term IoT Security
Result Type I: Doomsday Hacking
Scenarios
Yes, security is a concern
• Increased surface area for attacks
• Connects to the physical world around us
• Newer and tinier hardware
• Newer developers
Courtesy: Darkreading.com
Result Type II: Buy Our Product
But How Do I Build for Security?
Secure By Design
Device Interactions #1
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Remote Access
Iot secure connected devices indicthreads
Standards!
• No home-grown security schemes
• Rely on established security standards #2
TLS
• Transport Layer Security
• Certificate-based Server Authentication
• Secure Key Exchange
• Encrypted Channel
• Certificate-based Device Authentication
• Secures Bank Transactions
Technology Advancements
• Hardware Capability
• Memory
• CPU
• Strong Software
• Many Open Source implementations
Iot secure connected devices indicthreads
Courtesy: Ars Technica
An interesting search engine
Iot secure connected devices indicthreads
Malformed Content?
• What about: malware/viruses?
• Communicate with known server
• controller by known entities
• Write protection
Iot secure connected devices indicthreads
Local Access
Iot secure connected devices indicthreads
Local Network
• Acts as a client for outside world
• router firewall
• Encrypted traffic at the MAC layer
• Requires Password/Certificate for access (explicit
delegation)
Switch Network?
• Remember AP Security
• Force physical access to reset-to-factory
New
Device
Setup?
New
Device
Setup?
Authenticate the other endpoint! #3
Authenticate the other endpoint!
Iot secure connected devices indicthreads
Compromised User
• Guest access to the network?
• Malware on user’s phone?
• Additional Cryptographic layers on top of the MAC layer
• User Management
Tradeoff
Physical Access
Iot secure connected devices indicthreads
Iot secure connected devices indicthreads
Physical modification
• Change the server address/keys?
• Change the firmware?
• Trusted Boot
• Signed Firmware
• Encryption
Device Phishing
• Completely change the device?
• Device Authentication – PKI
Zarro Boogs Found!
• Firmware upgradeability
• Connectivity Bonus: evolving appliances
• Fix security vulnerabilities
• Possible attack vector 
Scrutinize #4
Iot secure connected devices indicthreads
@kedarsovani
Thank You!
Ad

More Related Content

What's hot (19)

Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.
Archana Krushnan
 
IoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsIoT Introduction Architecture and Applications
IoT Introduction Architecture and Applications
The IOT Academy
 
Mobile and IoT testing
Mobile and IoT testingMobile and IoT testing
Mobile and IoT testing
Langoor Clients
 
IoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT HubIoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT Hub
Marco Silva
 
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure IoT Hub
WinWire Technologies Inc
 
Ibm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIbm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_Capabilities
IBM_Info_Management
 
IoT Node-Red Presentation
IoT  Node-Red PresentationIoT  Node-Red Presentation
IoT Node-Red Presentation
The IOT Academy
 
Using an Open Source RESTful Backend for IoT Applications
Using an Open Source RESTful Backend for IoT ApplicationsUsing an Open Source RESTful Backend for IoT Applications
Using an Open Source RESTful Backend for IoT Applications
Jan Liband
 
An IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m servicesAn IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m services
Soumya Kanti Datta
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
Roshan Kulkarni
 
IoT on Azure
IoT on AzureIoT on Azure
IoT on Azure
Vinoth Rajagopalan
 
Demystifying Internet of Things with Azure IoT Suite
Demystifying Internet of Things with Azure IoT SuiteDemystifying Internet of Things with Azure IoT Suite
Demystifying Internet of Things with Azure IoT Suite
WinWire Technologies Inc
 
Business Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoTBusiness Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoT
Ilyas F ☁☁☁
 
Internet of things (IoT) with Azure
Internet of things (IoT) with AzureInternet of things (IoT) with Azure
Internet of things (IoT) with Azure
Vinoth Rajagopalan
 
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with AzureGlobal Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Vinoth Rajagopalan
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
Gordon Haff
 
Connecting IoT devices to Azure
Connecting IoT devices to AzureConnecting IoT devices to Azure
Connecting IoT devices to Azure
Guy Barrette
 
IoT on the Edge
IoT on the EdgeIoT on the Edge
IoT on the Edge
FIWARE
 
DotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il ConcentratoreDotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il Concentratore
Riccardo Cappello
 
Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.Stc 2016 regional-round-iot testing in agile.
Stc 2016 regional-round-iot testing in agile.
Archana Krushnan
 
IoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsIoT Introduction Architecture and Applications
IoT Introduction Architecture and Applications
The IOT Academy
 
IoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT HubIoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT Hub
Marco Silva
 
Ibm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIbm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_Capabilities
IBM_Info_Management
 
IoT Node-Red Presentation
IoT  Node-Red PresentationIoT  Node-Red Presentation
IoT Node-Red Presentation
The IOT Academy
 
Using an Open Source RESTful Backend for IoT Applications
Using an Open Source RESTful Backend for IoT ApplicationsUsing an Open Source RESTful Backend for IoT Applications
Using an Open Source RESTful Backend for IoT Applications
Jan Liband
 
An IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m servicesAn IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m services
Soumya Kanti Datta
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
Roshan Kulkarni
 
Demystifying Internet of Things with Azure IoT Suite
Demystifying Internet of Things with Azure IoT SuiteDemystifying Internet of Things with Azure IoT Suite
Demystifying Internet of Things with Azure IoT Suite
WinWire Technologies Inc
 
Business Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoTBusiness Transformation with Microsoft Azure IoT
Business Transformation with Microsoft Azure IoT
Ilyas F ☁☁☁
 
Internet of things (IoT) with Azure
Internet of things (IoT) with AzureInternet of things (IoT) with Azure
Internet of things (IoT) with Azure
Vinoth Rajagopalan
 
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with AzureGlobal Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Global Azure boot camp 2015 - Microsoft IoT Solutions with Azure
Vinoth Rajagopalan
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
Gordon Haff
 
Connecting IoT devices to Azure
Connecting IoT devices to AzureConnecting IoT devices to Azure
Connecting IoT devices to Azure
Guy Barrette
 
IoT on the Edge
IoT on the EdgeIoT on the Edge
IoT on the Edge
FIWARE
 
DotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il ConcentratoreDotNetToscana - Azure IoT Hub - Il Concentratore
DotNetToscana - Azure IoT Hub - Il Concentratore
Riccardo Cappello
 

Viewers also liked (13)

At8000 s configuracao de gerenciamento
At8000 s configuracao de gerenciamentoAt8000 s configuracao de gerenciamento
At8000 s configuracao de gerenciamento
NetPlus
 
Analysing digipaks 3
Analysing digipaks 3Analysing digipaks 3
Analysing digipaks 3
JoshWilliamson14
 
At8000 s configurando vlan avancado
At8000 s configurando vlan avancadoAt8000 s configurando vlan avancado
At8000 s configurando vlan avancado
NetPlus
 
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
motiondynamicsgadgetguy
 
At8000 s caracteristicas gerais
At8000 s caracteristicas geraisAt8000 s caracteristicas gerais
At8000 s caracteristicas gerais
NetPlus
 
Case Study: Marvell
Case Study: MarvellCase Study: Marvell
Case Study: Marvell
SysAid Technologies
 
Real world IoT for enterprises
Real world IoT for enterprisesReal world IoT for enterprises
Real world IoT for enterprises
IndicThreads
 
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
Polaris Associates
 
At8000 s arquitetura de empilhamento
At8000 s arquitetura de empilhamentoAt8000 s arquitetura de empilhamento
At8000 s arquitetura de empilhamento
NetPlus
 
Maxim zap cv_asic_backend_04_13
Maxim zap cv_asic_backend_04_13Maxim zap cv_asic_backend_04_13
Maxim zap cv_asic_backend_04_13
Maxim Zap
 
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
OptimalPlus
 
Summit 16: ARM Mini-Summit - NFV for the Masses - Marvell
Summit 16: ARM Mini-Summit - NFV for the Masses - MarvellSummit 16: ARM Mini-Summit - NFV for the Masses - Marvell
Summit 16: ARM Mini-Summit - NFV for the Masses - Marvell
OPNFV
 
WiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
WiFi (IEEE 802.11 WLAN) Patents for Standard RankingWiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
WiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
Alex G. Lee, Ph.D. Esq. CLP
 
At8000 s configuracao de gerenciamento
At8000 s configuracao de gerenciamentoAt8000 s configuracao de gerenciamento
At8000 s configuracao de gerenciamento
NetPlus
 
At8000 s configurando vlan avancado
At8000 s configurando vlan avancadoAt8000 s configurando vlan avancado
At8000 s configurando vlan avancado
NetPlus
 
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
Marvell Plug Computer 3.0- David Novak (TheGadgetGUYcolumn.com)
motiondynamicsgadgetguy
 
At8000 s caracteristicas gerais
At8000 s caracteristicas geraisAt8000 s caracteristicas gerais
At8000 s caracteristicas gerais
NetPlus
 
Real world IoT for enterprises
Real world IoT for enterprisesReal world IoT for enterprises
Real world IoT for enterprises
IndicThreads
 
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
How Marvell Semiconductor Implemented Executive Dashboards in 17 Countries in...
Polaris Associates
 
At8000 s arquitetura de empilhamento
At8000 s arquitetura de empilhamentoAt8000 s arquitetura de empilhamento
At8000 s arquitetura de empilhamento
NetPlus
 
Maxim zap cv_asic_backend_04_13
Maxim zap cv_asic_backend_04_13Maxim zap cv_asic_backend_04_13
Maxim zap cv_asic_backend_04_13
Maxim Zap
 
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
ITC 2015 - Marvell Present : "Improving Quality and Yield Through Optimal+ Bi...
OptimalPlus
 
Summit 16: ARM Mini-Summit - NFV for the Masses - Marvell
Summit 16: ARM Mini-Summit - NFV for the Masses - MarvellSummit 16: ARM Mini-Summit - NFV for the Masses - Marvell
Summit 16: ARM Mini-Summit - NFV for the Masses - Marvell
OPNFV
 
WiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
WiFi (IEEE 802.11 WLAN) Patents for Standard RankingWiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
WiFi (IEEE 802.11 WLAN) Patents for Standard Ranking
Alex G. Lee, Ph.D. Esq. CLP
 
Ad

Similar to Iot secure connected devices indicthreads (20)

Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Codiax
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdk
Martin Vigo
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Positive Hack Days
 
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st SessionBeginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
veerababu penugonda(Mr-IoT)
 
The Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTThe Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoT
Jim McKeeth
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
Justin Black
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
ハイシンク創研 / Laboratory of Hi-Think Corporation
 
How to create a secure IoT device
How to create a secure IoT deviceHow to create a secure IoT device
How to create a secure IoT device
Abhijeet Rane
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
Jay Nagar
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Man in the Binder
Man in the BinderMan in the Binder
Man in the Binder
nitayart
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
WSO2
 
IoT security
IoT securityIoT security
IoT security
YashKesharwani2
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Codiax
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdk
Martin Vigo
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Positive Hack Days
 
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st SessionBeginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
veerababu penugonda(Mr-IoT)
 
The Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoTThe Internet of Things and You - A Developers Guide to IoT
The Internet of Things and You - A Developers Guide to IoT
Jim McKeeth
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
Justin Black
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
ハイシンク創研 / Laboratory of Hi-Think Corporation
 
How to create a secure IoT device
How to create a secure IoT deviceHow to create a secure IoT device
How to create a secure IoT device
Abhijeet Rane
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
Jay Nagar
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Man in the Binder
Man in the BinderMan in the Binder
Man in the Binder
nitayart
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
WSO2
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Ad

More from IndicThreads (20)

Http2 is here! And why the web needs it
Http2 is here! And why the web needs itHttp2 is here! And why the web needs it
Http2 is here! And why the web needs it
IndicThreads
 
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Understanding Bitcoin (Blockchain) and its Potential for Disruptive ApplicationsUnderstanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
IndicThreads
 
Go Programming Language - Learning The Go Lang way
Go Programming Language - Learning The Go Lang wayGo Programming Language - Learning The Go Lang way
Go Programming Language - Learning The Go Lang way
IndicThreads
 
Building Resilient Microservices
Building Resilient Microservices Building Resilient Microservices
Building Resilient Microservices
IndicThreads
 
App using golang indicthreads
App using golang  indicthreadsApp using golang  indicthreads
App using golang indicthreads
IndicThreads
 
Building on quicksand microservices indicthreads
Building on quicksand microservices  indicthreadsBuilding on quicksand microservices  indicthreads
Building on quicksand microservices indicthreads
IndicThreads
 
How to Think in RxJava Before Reacting
How to Think in RxJava Before ReactingHow to Think in RxJava Before Reacting
How to Think in RxJava Before Reacting
IndicThreads
 
Functional Programming Past Present Future
Functional Programming Past Present FutureFunctional Programming Past Present Future
Functional Programming Past Present Future
IndicThreads
 
Harnessing the Power of Java 8 Streams
Harnessing the Power of Java 8 Streams Harnessing the Power of Java 8 Streams
Harnessing the Power of Java 8 Streams
IndicThreads
 
Building & scaling a live streaming mobile platform - Gr8 road to fame
Building & scaling a live streaming mobile platform - Gr8 road to fameBuilding & scaling a live streaming mobile platform - Gr8 road to fame
Building & scaling a live streaming mobile platform - Gr8 road to fame
IndicThreads
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads Conference
IndicThreads
 
Cars and Computers: Building a Java Carputer
 Cars and Computers: Building a Java Carputer Cars and Computers: Building a Java Carputer
Cars and Computers: Building a Java Carputer
IndicThreads
 
Scrap Your MapReduce - Apache Spark
 Scrap Your MapReduce - Apache Spark Scrap Your MapReduce - Apache Spark
Scrap Your MapReduce - Apache Spark
IndicThreads
 
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
 Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
IndicThreads
 
Speed up your build pipeline for faster feedback
Speed up your build pipeline for faster feedbackSpeed up your build pipeline for faster feedback
Speed up your build pipeline for faster feedback
IndicThreads
 
Unraveling OpenStack Clouds
 Unraveling OpenStack Clouds Unraveling OpenStack Clouds
Unraveling OpenStack Clouds
IndicThreads
 
Digital Transformation of the Enterprise. What IT leaders need to know!
Digital Transformation of the Enterprise. What IT  leaders need to know!Digital Transformation of the Enterprise. What IT  leaders need to know!
Digital Transformation of the Enterprise. What IT leaders need to know!
IndicThreads
 
Architectural Considerations For Complex Mobile And Web Applications
 Architectural Considerations For Complex Mobile And Web Applications Architectural Considerations For Complex Mobile And Web Applications
Architectural Considerations For Complex Mobile And Web Applications
IndicThreads
 
Functional Programming With Lambdas and Streams in JDK8
 Functional Programming With Lambdas and Streams in JDK8 Functional Programming With Lambdas and Streams in JDK8
Functional Programming With Lambdas and Streams in JDK8
IndicThreads
 
Changing application demands: What developers need to know
Changing application demands: What developers need to knowChanging application demands: What developers need to know
Changing application demands: What developers need to know
IndicThreads
 
Http2 is here! And why the web needs it
Http2 is here! And why the web needs itHttp2 is here! And why the web needs it
Http2 is here! And why the web needs it
IndicThreads
 
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Understanding Bitcoin (Blockchain) and its Potential for Disruptive ApplicationsUnderstanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
IndicThreads
 
Go Programming Language - Learning The Go Lang way
Go Programming Language - Learning The Go Lang wayGo Programming Language - Learning The Go Lang way
Go Programming Language - Learning The Go Lang way
IndicThreads
 
Building Resilient Microservices
Building Resilient Microservices Building Resilient Microservices
Building Resilient Microservices
IndicThreads
 
App using golang indicthreads
App using golang  indicthreadsApp using golang  indicthreads
App using golang indicthreads
IndicThreads
 
Building on quicksand microservices indicthreads
Building on quicksand microservices  indicthreadsBuilding on quicksand microservices  indicthreads
Building on quicksand microservices indicthreads
IndicThreads
 
How to Think in RxJava Before Reacting
How to Think in RxJava Before ReactingHow to Think in RxJava Before Reacting
How to Think in RxJava Before Reacting
IndicThreads
 
Functional Programming Past Present Future
Functional Programming Past Present FutureFunctional Programming Past Present Future
Functional Programming Past Present Future
IndicThreads
 
Harnessing the Power of Java 8 Streams
Harnessing the Power of Java 8 Streams Harnessing the Power of Java 8 Streams
Harnessing the Power of Java 8 Streams
IndicThreads
 
Building & scaling a live streaming mobile platform - Gr8 road to fame
Building & scaling a live streaming mobile platform - Gr8 road to fameBuilding & scaling a live streaming mobile platform - Gr8 road to fame
Building & scaling a live streaming mobile platform - Gr8 road to fame
IndicThreads
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads Conference
IndicThreads
 
Cars and Computers: Building a Java Carputer
 Cars and Computers: Building a Java Carputer Cars and Computers: Building a Java Carputer
Cars and Computers: Building a Java Carputer
IndicThreads
 
Scrap Your MapReduce - Apache Spark
 Scrap Your MapReduce - Apache Spark Scrap Your MapReduce - Apache Spark
Scrap Your MapReduce - Apache Spark
IndicThreads
 
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
 Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
IndicThreads
 
Speed up your build pipeline for faster feedback
Speed up your build pipeline for faster feedbackSpeed up your build pipeline for faster feedback
Speed up your build pipeline for faster feedback
IndicThreads
 
Unraveling OpenStack Clouds
 Unraveling OpenStack Clouds Unraveling OpenStack Clouds
Unraveling OpenStack Clouds
IndicThreads
 
Digital Transformation of the Enterprise. What IT leaders need to know!
Digital Transformation of the Enterprise. What IT  leaders need to know!Digital Transformation of the Enterprise. What IT  leaders need to know!
Digital Transformation of the Enterprise. What IT leaders need to know!
IndicThreads
 
Architectural Considerations For Complex Mobile And Web Applications
 Architectural Considerations For Complex Mobile And Web Applications Architectural Considerations For Complex Mobile And Web Applications
Architectural Considerations For Complex Mobile And Web Applications
IndicThreads
 
Functional Programming With Lambdas and Streams in JDK8
 Functional Programming With Lambdas and Streams in JDK8 Functional Programming With Lambdas and Streams in JDK8
Functional Programming With Lambdas and Streams in JDK8
IndicThreads
 
Changing application demands: What developers need to know
Changing application demands: What developers need to knowChanging application demands: What developers need to know
Changing application demands: What developers need to know
IndicThreads
 

Recently uploaded (20)

Week 2 lecture PCD 203skoacolacbabolabiocasoc
Week 2 lecture PCD 203skoacolacbabolabiocasocWeek 2 lecture PCD 203skoacolacbabolabiocasoc
Week 2 lecture PCD 203skoacolacbabolabiocasoc
saidraqb5
 
Autodesk AutoCAD Map 3D Crack Free Download Latest Version 2025
Autodesk AutoCAD Map 3D Crack Free Download Latest Version 2025Autodesk AutoCAD Map 3D Crack Free Download Latest Version 2025
Autodesk AutoCAD Map 3D Crack Free Download Latest Version 2025
usmankhan66g66
 
SoftwareandOperatingSystemsColored133.pptx
SoftwareandOperatingSystemsColored133.pptxSoftwareandOperatingSystemsColored133.pptx
SoftwareandOperatingSystemsColored133.pptx
kamfertsolev
 
THE SCANNING ELECTRON MICROSOPE (SEM)....
THE SCANNING ELECTRON MICROSOPE (SEM)....THE SCANNING ELECTRON MICROSOPE (SEM)....
THE SCANNING ELECTRON MICROSOPE (SEM)....
RahulRajai
 
DSA 3050 Project busines intelligence and visualisation Presentation.pptx
DSA 3050 Project  busines intelligence and visualisation Presentation.pptxDSA 3050 Project  busines intelligence and visualisation Presentation.pptx
DSA 3050 Project busines intelligence and visualisation Presentation.pptx
saruni1
 
Auslogics File Recovery Professional 12.0.1 Crack New Version Latest 2025
Auslogics File Recovery Professional 12.0.1 Crack New Version Latest 2025Auslogics File Recovery Professional 12.0.1 Crack New Version Latest 2025
Auslogics File Recovery Professional 12.0.1 Crack New Version Latest 2025
usmankhan66g66
 
High Perfomance and Reliability Inverter
High Perfomance and Reliability InverterHigh Perfomance and Reliability Inverter
High Perfomance and Reliability Inverter
CarlosFranco13613
 
办理学历认证(荷兰HKU毕业证)乌特勒支艺术大学毕业证书
办理学历认证(荷兰HKU毕业证)乌特勒支艺术大学毕业证书办理学历认证(荷兰HKU毕业证)乌特勒支艺术大学毕业证书
办理学历认证(荷兰HKU毕业证)乌特勒支艺术大学毕业证书
Taqyea
 
Informe mensual Marzo sobre el informe de un servicio
Informe mensual Marzo sobre el informe de un servicioInforme mensual Marzo sobre el informe de un servicio
Informe mensual Marzo sobre el informe de un servicio
serviciotecnico65
 
Ch 2 The Microprocessor and its Architecture.ppt
Ch 2 The Microprocessor and its Architecture.pptCh 2 The Microprocessor and its Architecture.ppt
Ch 2 The Microprocessor and its Architecture.ppt
ermiasgesgis
 
SlideEgg_22923-Music PowerPoint Templates-4-Blue.pptx
SlideEgg_22923-Music PowerPoint Templates-4-Blue.pptxSlideEgg_22923-Music PowerPoint Templates-4-Blue.pptx
SlideEgg_22923-Music PowerPoint Templates-4-Blue.pptx
huyenpham220998
 
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptxCrim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
russelrosas
 
Auslogics BoostSpeed Pro 14.0.1 Crack Free Download Latest 2025
Auslogics BoostSpeed Pro 14.0.1 Crack Free Download Latest 2025Auslogics BoostSpeed Pro 14.0.1 Crack Free Download Latest 2025
Auslogics BoostSpeed Pro 14.0.1 Crack Free Download Latest 2025
usmankhan66g66
 
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctrMayur Seminar.pptxbgvyezuvdt as bijvyivutctr
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
vaishnavishitole195
 
Clip Studio Paint EX Crack Download (Latest Version 2025)
Clip Studio Paint EX Crack Download (Latest Version 2025)Clip Studio Paint EX Crack Download (Latest Version 2025)
Clip Studio Paint EX Crack Download (Latest Version 2025)
usmankhan66g66
 
JOINING ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON WHATSAPP+256782561496/0756...
JOINING ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON WHATSAPP+256782561496/0756...JOINING ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON WHATSAPP+256782561496/0756...
JOINING ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON WHATSAPP+256782561496/0756...
REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682
 
Spin_LED_Presentation_Mustaqeem_2025.pptx
Spin_LED_Presentation_Mustaqeem_2025.pptxSpin_LED_Presentation_Mustaqeem_2025.pptx
Spin_LED_Presentation_Mustaqeem_2025.pptx
mustaqeemmujahid
 
How to Buy a Telegram Account_ Everything You Need to Know.pdf
How to Buy a Telegram Account_ Everything You Need to Know.pdfHow to Buy a Telegram Account_ Everything You Need to Know.pdf
How to Buy a Telegram Account_ Everything You Need to Know.pdf
buelljasonnn
 
Ashampoo Photo Commander Crack Download (Latest New Version 2025)
Ashampoo Photo Commander Crack Download (Latest New Version 2025)Ashampoo Photo Commander Crack Download (Latest New Version 2025)
Ashampoo Photo Commander Crack Download (Latest New Version 2025)
usmankhan66g66
 
Unidad Pedagogica 3ro-4to.documento090904
Unidad Pedagogica 3ro-4to.documento090904Unidad Pedagogica 3ro-4to.documento090904
Unidad Pedagogica 3ro-4to.documento090904
maylingcastro9
 
Week 2 lecture PCD 203skoacolacbabolabiocasoc
Week 2 lecture PCD 203skoacolacbabolabiocasocWeek 2 lecture PCD 203skoacolacbabolabiocasoc
Week 2 lecture PCD 203skoacolacbabolabiocasoc
saidraqb5
 
Autodesk AutoCAD Map 3D Crack Free Download Latest Version 2025
Autodesk AutoCAD Map 3D Crack Free Download Latest Version 2025Autodesk AutoCAD Map 3D Crack Free Download Latest Version 2025
Autodesk AutoCAD Map 3D Crack Free Download Latest Version 2025
usmankhan66g66
 
SoftwareandOperatingSystemsColored133.pptx
SoftwareandOperatingSystemsColored133.pptxSoftwareandOperatingSystemsColored133.pptx
SoftwareandOperatingSystemsColored133.pptx
kamfertsolev
 
THE SCANNING ELECTRON MICROSOPE (SEM)....
THE SCANNING ELECTRON MICROSOPE (SEM)....THE SCANNING ELECTRON MICROSOPE (SEM)....
THE SCANNING ELECTRON MICROSOPE (SEM)....
RahulRajai
 
DSA 3050 Project busines intelligence and visualisation Presentation.pptx
DSA 3050 Project  busines intelligence and visualisation Presentation.pptxDSA 3050 Project  busines intelligence and visualisation Presentation.pptx
DSA 3050 Project busines intelligence and visualisation Presentation.pptx
saruni1
 
Auslogics File Recovery Professional 12.0.1 Crack New Version Latest 2025
Auslogics File Recovery Professional 12.0.1 Crack New Version Latest 2025Auslogics File Recovery Professional 12.0.1 Crack New Version Latest 2025
Auslogics File Recovery Professional 12.0.1 Crack New Version Latest 2025
usmankhan66g66
 
High Perfomance and Reliability Inverter
High Perfomance and Reliability InverterHigh Perfomance and Reliability Inverter
High Perfomance and Reliability Inverter
CarlosFranco13613
 
办理学历认证(荷兰HKU毕业证)乌特勒支艺术大学毕业证书
办理学历认证(荷兰HKU毕业证)乌特勒支艺术大学毕业证书办理学历认证(荷兰HKU毕业证)乌特勒支艺术大学毕业证书
办理学历认证(荷兰HKU毕业证)乌特勒支艺术大学毕业证书
Taqyea
 
Informe mensual Marzo sobre el informe de un servicio
Informe mensual Marzo sobre el informe de un servicioInforme mensual Marzo sobre el informe de un servicio
Informe mensual Marzo sobre el informe de un servicio
serviciotecnico65
 
Ch 2 The Microprocessor and its Architecture.ppt
Ch 2 The Microprocessor and its Architecture.pptCh 2 The Microprocessor and its Architecture.ppt
Ch 2 The Microprocessor and its Architecture.ppt
ermiasgesgis
 
SlideEgg_22923-Music PowerPoint Templates-4-Blue.pptx
SlideEgg_22923-Music PowerPoint Templates-4-Blue.pptxSlideEgg_22923-Music PowerPoint Templates-4-Blue.pptx
SlideEgg_22923-Music PowerPoint Templates-4-Blue.pptx
huyenpham220998
 
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptxCrim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
russelrosas
 
Auslogics BoostSpeed Pro 14.0.1 Crack Free Download Latest 2025
Auslogics BoostSpeed Pro 14.0.1 Crack Free Download Latest 2025Auslogics BoostSpeed Pro 14.0.1 Crack Free Download Latest 2025
Auslogics BoostSpeed Pro 14.0.1 Crack Free Download Latest 2025
usmankhan66g66
 
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctrMayur Seminar.pptxbgvyezuvdt as bijvyivutctr
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
vaishnavishitole195
 
Clip Studio Paint EX Crack Download (Latest Version 2025)
Clip Studio Paint EX Crack Download (Latest Version 2025)Clip Studio Paint EX Crack Download (Latest Version 2025)
Clip Studio Paint EX Crack Download (Latest Version 2025)
usmankhan66g66
 
Spin_LED_Presentation_Mustaqeem_2025.pptx
Spin_LED_Presentation_Mustaqeem_2025.pptxSpin_LED_Presentation_Mustaqeem_2025.pptx
Spin_LED_Presentation_Mustaqeem_2025.pptx
mustaqeemmujahid
 
How to Buy a Telegram Account_ Everything You Need to Know.pdf
How to Buy a Telegram Account_ Everything You Need to Know.pdfHow to Buy a Telegram Account_ Everything You Need to Know.pdf
How to Buy a Telegram Account_ Everything You Need to Know.pdf
buelljasonnn
 
Ashampoo Photo Commander Crack Download (Latest New Version 2025)
Ashampoo Photo Commander Crack Download (Latest New Version 2025)Ashampoo Photo Commander Crack Download (Latest New Version 2025)
Ashampoo Photo Commander Crack Download (Latest New Version 2025)
usmankhan66g66
 
Unidad Pedagogica 3ro-4to.documento090904
Unidad Pedagogica 3ro-4to.documento090904Unidad Pedagogica 3ro-4to.documento090904
Unidad Pedagogica 3ro-4to.documento090904
maylingcastro9
 

Iot secure connected devices indicthreads

Editor's Notes

  • #22: Mention that direct access to the device is protected by the gateway/firewall man in the middle - read/modify traffic replay - open door lock dns spoof - redirect to malicious server
  • #27: Talk about user-association challenges, TLS, authorized APIs OLA Money example
  • #32: From an attacker’s point of view, attack vector limited to being near each device and then exploiting the vulnerability
  • #35: From an attacker’s point of view, attack vector limited to being near each device and then exploiting the vulnerability
  翻译: