OnBoard Security InSights

Setting Security Goals and Requirements

Posted by Lee Wilson on Aug 16, 2018 12:57:00 PM

To get a clear view of your security goals and requirements it is very useful to categorize your project into one of four target environments.  

Read More

Topics: Internet of Things, Privacy, Cyber Security

Four Simple Software Models To Built System Security

Posted by Lee Wilson on Aug 7, 2018 5:55:00 PM

Every day, thousands of new devices are given internet connectivity - called the Internet of Things (IoT).   Figure 1 displays IoT devices attacked worldwide in 2015. Most of the internet connected devices are inherently insecure and hackers realize this as an easy opportunity.  Even though home routers were the most targeted devices, others weren’t spared.

Read More

Topics: Internet of Things

Whitepaper: Setting and Achieving Security Design Goals

Posted by Lee Wilson on Aug 6, 2018 12:53:00 PM

This whitepaper provides a framework on system security design and the security software needed to achieve a system’s security goal.  Four software models are examined and critiqued, with recommended strategies for choosing vendors within those differing models.

Read More

Topics: Internet of Things, Cyber Security

Top-Down and Bottom-Up Defenses to Secure IoT

Posted by Lee Wilson on May 24, 2018 12:14:38 PM
Many IoT device manufacturers understand the need for cyber security but aren’t sure where to begin. To add to the confusion, some security vendors will claim their firewall or password system or a “magic bullet” will protect your system from every type of attack. Don’t believe the hype.
Read More

Topics: TPM, TSS, Cyber Security, Embedded Security, Internet of Things, Cryptography

Trusted Computing Primary Use Cases

Posted by Lee Wilson on May 17, 2018 1:18:08 PM

There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by the Trusted Computing Group. This blog will give a brief overview of those use cases, which can be combined to create more complex and powerful solutions.

Read More

Topics: TPM, Internet of Things, Embedded Security, Cyber Security, TSS, Trusted Computing

TPM - a Powerful, Inexpensive Security Building Block

Posted by Lee Wilson on Mar 22, 2018 1:51:50 PM

There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.

Read More

Topics: TPM, Trusted Computing, TSS, Cyber Security, Embedded Security, Internet of Things, Cryptography

The OnBoard Security Mission

Posted by Peter Samson on Jan 11, 2018 12:24:30 PM

I often get asked, what is the company’s mission?

Read More

Topics: DSRC, Connected Vehicles, Research, V2V, TPM, Trusted Computing, TSS, Cyber Security, Autonomous Vehicles, Embedded Security, Regulation, Automotive, V2X, Internet of Things, Privacy, Quantum Computing, Cryptography, NTRU, BCAM, SCMS

Secure Crypto Key Management for Automotive

Posted by Gene Carter on Nov 1, 2017 12:21:38 PM

Car makers use cryptographic keys for a variety of purposes, including Over-The-Air (OTA) software updates, security immobilizers, inter-module communications, and Vehicle-to-Everything (V2X) communication security. Key Management Systems (KMS) are very complex, as the manufacturer has to manage dozens of keys for each car model, both at production and when new components are introduced during repairs, and they must maintain these keys over the long lifetime of a car. Key Management is a daunting task.

Read More

Topics: Automotive, Autonomous Vehicles, Connected Vehicles, Cyber Security, Cryptography, Embedded Security, Research, Internet of Things

Learn About the Latest in IoT Security from Our Team of Experts

 

OnBoard Security's security experts share insights on the latest security topics in:

  • Connected Cars
  • Autonomous Vehicles
  • Internet of Things
  • Quantum Computing

Subscribe to Email Updates

Recent Posts