OnBoard Security InSights

Four Simple Software Models To Built System Security

Posted by Lee Wilson on Aug 7, 2018 5:55:00 PM

Every day, thousands of new devices are given internet connectivity - called the Internet of Things (IoT).   Figure 1 displays IoT devices attacked worldwide in 2015. Most of the internet connected devices are inherently insecure and hackers realize this as an easy opportunity.  Even though home routers were the most targeted devices, others weren’t spared.

Read More

Topics: Internet of Things, IoT,

Whitepaper: Setting and Achieving Security Design Goals

Posted by Lee Wilson on Aug 6, 2018 12:53:00 PM

This whitepaper provides a framework on system security design and the security software needed to achieve a system’s security goal.  Four software models are examined and critiqued, with recommended strategies for choosing vendors within those differing models.

Read More

Topics: Internet of Things, Cyber Security, IoT,

The Future of Blockchain - A Lack of Authenticity and Privacy

Posted by Zhenfei Zhang on Jul 31, 2018 4:22:00 PM

Modern technology is all about buzz words. Unless you have been trapped in the phantom zone for the past few years, you must have heard of quantum computers and blockchains. Some say that quantum computers are the next generation of computers, and blockchains are the next generation of the Internet. What will the next generation look like when we have both quantum computers and blockchains in a same room? A quantum apocalypse.

Read More

Topics: NTRU, Cyptography, Quantum Computing, blockchain

Top-Down and Bottom-Up Defenses to Secure IoT

Posted by Lee Wilson on May 24, 2018 12:14:38 PM
Many IoT device manufacturers understand the need for cyber security but aren’t sure where to begin. To add to the confusion, some security vendors will claim their firewall or password system or a “magic bullet” will protect your system from every type of attack. Don’t believe the hype.
Read More

Topics: Cyptography, Internet of Things, Embedded Security, Cyber Security, TPM, TSS, IoT,

Trusted Computing Primary Use Cases

Posted by Lee Wilson on May 17, 2018 1:18:08 PM

There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by the Trusted Computing Group. This blog will give a brief overview of those use cases, which can be combined to create more complex and powerful solutions.

Read More

Topics: Internet of Things, Embedded Security, Cyber Security, TPM, TSS, Trusted Computing, IoT,

TPM - a Powerful, Inexpensive Security Building Block

Posted by Lee Wilson on Mar 22, 2018 1:51:50 PM

There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.

Read More

Topics: Cyptography, Internet of Things, Embedded Security, Cyber Security, TPM, TSS, Trusted Computing, IoT,

Connected Cars Security - Q&A

Posted by William Whyte on Feb 12, 2018 11:25:56 AM

OnBoard Security’s Chief Technology Officer, Dr. William Whyte, has been involved in Vehicle-to-Everything (V2X) communications security for nearly 20 years. He is the editor of the IEEE 1609.2 security standard and has consulted for numerous automaker, the US Dept. of Transportation (DOT) and transportation organizations around the world. He is frequently asked to explain V2X security and give insights on potential vulnerabilities in the system.

Read More

Topics: Automotive, V2X, Autonomous Vehicles, Regulation, V2V, SCMS, Research, Connected Vehicles, DSRC

What are Automated Vehicle Security Concerns?

Posted by Jonathan Petit on Jan 24, 2018 3:25:56 PM

At the Automated Vehicles Symposium (AVS) 2017, I addressed a plenary talk to the ~1,500 attendees, stating that even though it is unanimously considered as paramount, cybersecurity is still an after-thought. Or at least it still feels like it. Indeed, for the last two AVS editions, the cybersecurity breakout session reported similar open challenges, but no real changes have been seen since. In order to move the security needle, we took a different approach and didn't organize a cybersecurity breakout session. Instead, we identified that the missing components were the lack of inputs coming from the community of experts. To be able to build a more resilient system, cybersecurity experts should know about the limitations of each subsystem, and possible "nightmare scenarios".

Read More

Topics: Insider, Automotive, Embedded Security, Autonomous Vehicles, Cyber Security, Research, Connected Vehicles

Learn About the Latest in IoT Security from Our Team of Experts

 

OnBoard Security's security experts share insights on the latest security topics in:

  • Connected Cars
  • Autonomous Vehicles
  • Internet of Things
  • Quantum Computing

Subscribe to Email Updates

Recent Posts