Smart University Home Programs > Products' Piracy Protection with ...
Embedded Devices
1 Day
Training
 
Products' Piracy Protection with Embedded Hardware and Software
Presentation
This module introduces product designers and architects to the problem of product counterfeiting in the field of embedded systems. Relevant problems will be identified from a technological viewpoint and possible solutions will be presented and discussed.

The introductory part gives a first idea about the dimension of the product piracy problem through examples. They will introduce specific attack scenarios and protection goals. The overall goal is the hardening of a specific product with embedded hardware and software against reverse engineering.
The second part deals with microcontroller systems, normally used in today’s products to control the rich set of features available. The experience of the smart card industry is transferred into the world of other embedded systems. Countermeasures, well known from smart cards, can be and have to be used in other embedded systems to increase their robustness against product piracy.
The third part summarizes ideas with low cost countermeasures which give a good tradeoff between security increase and cost. This part presents the pros and cons of commercially available solutions and customized solutions to be reconsidered (programmable logic devices).  Some alternatives to high security cryptographic methods will be assessed.The last session focuses on protecting the software against product piracy and manipulations. Techniques to protect software against attacks and the interaction with hardware trust anchors are explained. It is shown how principles of the Trusted Computing Group and virtualization concepts can be used to protect embedded systems.

Training's objectives
Participants will get first ideas how to better protect embedded systems against threats, e.g. product piracy. All relevant areas will be touched from hardware to software, from concept to implementation.

Key topics
Product Piracy, Counterfeiting, Intellectual Property Protection, Anti Reverse Engineering, Smart Card Security, Trusted Computing, Virtualization, Embedded Systems Security, Design Security

Who should attend?
Concept engineers and system designers are the primary target group of the training. Technical marketing, logistics, and production, who are involved in the decision process for implementing counter measures, should attend as well.


Program
9:00 – 10:00
Introduction to hardware attacks and the product piracy problem
Dipl.-Inf. Bartol Filipovic, Fraunhofer SIT
• The product piracy problem: dimension and examples
• 
Specific attack scenarios and protection goals against reverse engineering
• 
Countermeasures on different levels of the design

10:15 – 12:15 
Transfer of smartcard technologies to protect embedded systems
Prof. Dr.-Ing. Georg Sigl, TUM and Fraunhofer SIT
• 
Architectures of smart card controllers and their security features
• 
Product life cycle of a smart card: a main part of the protection mechanism
• Design methodology of a secure embedded system

13:30 – 15:00 
Lightweight hardware measures to protect products products
Dipl.-Inf. Bartol Filipovic, Fraunhofer SIT
• Overview of commercially available solutions
• 
Customized solutions
• 
Alternatives to high security cryptographic methods

15:30 – 17:00
Available solutions for protecting embedded software
Dr. Frederic Stumpf, Fraunhofer SIT
• 
Techniques to protect software against attacks
• 
Interaction with hardware trust anchors 
• Using Trusted Computing Group and virtualization concepts

Module designed and coordinated by Pr Georg Sigl, Institute for Secure Information Technology, Technische Universitaet Muenchen (TUM) 
 
WHERE AND WHEN?
 
no dates for the moment
 
RATES
 
From €200 (excl. vat)

  To register

Sponsor