Embedded Hardware Authentication

As per IFF (Incognito Forensic Foundation), there are top 5 latest cybersecurity technologies or trends out there, that I think would make great sense if I go with one of those for this blog, so I decided to go with Embedded Hardware Authentication (A. 2019, November 8).

What is Embedded Hardware Authentication? As the term states, it’s a hardware-based authentication that’s embedded into the hardware itself to add an extra layer of security. Normally, users log in to a machine using their PIN and/or Password, which can easily be compromised, but in embedded authentication, it verifies the user’s identity before it’ll let them access the device. Most of us are aware of two-factor authentication but in this latest trend, an organization can implement two, three, or even four different methods of authentication in a row to enhance security. Under Embedded Hardware Authentication, things are slightly different than we’re used to.  For example, users don’t necessarily receive a PIN sent to their phone to log in (Common method of two-factor authentication). Instead, Intel Authenticate might require users to download an app to their phone. It then looks for the phone’s Bluetooth signal to verify user identity to assure that you are actually at your desk. It’s similar to “keyless cars” that use key’s signal to assure the owner is nearby before it’ll let you unlock including let you start/stop the car without physically using your keys (Hachman, M. 2016, January 20).

So why do we need embedded security? Embedded devices are very different from standard PCs which is why they are called Embedded. They are designed to perform the pre-configured task and most of them use a specialized operating system such as VxWorks, MQX, or Integrity, or a stripped-down version of Linux. Installing new software or patch on the system requires a specialized upgrade process so it’s not as simple as it seems because we can imagine how many embedded devices we will find in a smart car such as Tesla, so upgrading the OS on every embedded hardware will be nearly impossible. As these devices are vulnerable, there have been several well-documented attacks on embedded devices ranging from hacked vehicle anti-theft and control systems to hijacked printers that sent copies of documents to the hacker’s computer. Many embedded devices include password-protected logins including encrypted protocols such as SSH or SSL, but these are not sufficient, otherwise, we won’t see security breaches in the media every day which is why embedded hardware authentication is needed. There are several security challenges in embedded hardware as well, here are some of the challenges (Security Requirements for Embedded Devices What is Really Needed? | Icon Labs. (n.d.):

  • Critical functionality: Embedded devices control transportation infrastructure, utility grids, communication systems, and many other capabilities modern society relies upon. Interruption of these capabilities by a cyber-attack could have catastrophic consequences.
  • Replication: Once designed and built, embedded devices are mass-produced. There may be thousands to millions of identical devices. If a hacker can build a successful attack against one of these devices, the attack can be replicated across all devices.
  • Security assumptions: Many embedded engineers have long assumed that embedded devices are not targets for hackers. These assumptions are based on outdated assumptions including the belief in security by obscurity. As a result, security is often not considered a critical priority for embedded designs. Today’s embedded design projects are often including security for the first time and do not have experience and previous security projects to build upon.
  • Not easily patched: Most embedded devices are not easily upgraded. Once they are deployed, they will run the software that was installed at the factory. Any remote software update capability needs to be designed into the device to allow security updates. The specialized operating systems used to build embedded devices may not have automated capabilities that allow easy updates to the device firmware to ensure security capabilities are frequently updated.
  • Long life cycle: The life cycle for embedded devices is typically much longer than for PCs or consumer devices. Devices may be in the field for 15 or even 20 years. Building a device today that will stand up to the security requirements of the next two decades is a tremendous challenge.

As computer hardware technologies are getting popular, Intel went ahead and launched their chips to include this technology, called “Intel vPro” which includes VT-x, VT-d, Trusted Execution Technology (TXT), and Intel Active Management Technology (AMT). It was first released back in 2007 where Intel started printing vPro on their chips as well as shown below:

Intel has released several chips since 2007 that includes vPro but their latest 8th Gen Intel Core series processors were launched in April 2019 where things are secure even more such as it requires a Trusted Platform Module (TPM) cryptoprocessor chip and internet connection (wired or wireless) before some of the security features can be enabled (Casey, H. T. 2019, April 16).

Embedded Hardware Authentication is getting popular every day because of all the attacks on desktops, servers, and PCs that are increasing, so most organizations are moving forward to enhance their security as soon as possible too. Embedded devices are now interconnected in our everyday life as it’s Internet-of-Things (IoT) age. Now we use embedded devices in our cars, our offices, our houses with home automation, our skin with the influx of wearables, and sometimes even our bodies (e.g. pacemaker, insulin pump). To give some idea of this growing trend, about 6.4 billion devices were connected in 2016, an increase of 30% from 2015. Soon, the number of embedded devices connected to the Internet will be greater than the number of PCs. Therefore, it is becoming important to consider potential risks (i.e. information security, privacy, or safety). As more and more consumers are relying on hardware-based authentication including organizations, industrial-based organizations started the embedded hardware platform as well. In industrial plants, any asset connected to the industrial internet of things (IIoT) without proper security is at risk of cyber-attack as well (N. 2019, June 21).


Resources:-

(2019, November 8). The 5 Latest Cyber Security Technologies for Your Business. IFF Lab. https://ifflab.org/the-5-latest-cyber-security-technologies-for-your-business/

Research, A. (2020, June 24). Embedded Hardware Security Shipments to Hit 5 Billion by 2024, Driven by Increasing IoT Cyber Protection Demands. CISION. https://www.prnewswire.com/news-releases/embedded-hardware-security-shipments-to-hit-5-billion-by-2024-driven-by-increasing-iot-cyber-protection-demands-301082288.html

Hachman, M. (2016, January 20). Intel’s Authenticate tech brings simple-but-powerful security to Skylake chips. PCWorld. https://www.pcworld.com/article/3024314/intels-authenticate-tech-brings-simple-but-powerful-security-to-skylake-chips.html

N. (2019, June 21). Industrial Cybersecurity Starts at the Embedded Hardware Platform. Tech Monitor. https://techmonitor.ai/techonology/cybersecurity/industrial-cybersecurity-embedded-hardware

Security Requirements for Embedded Devices What is Really Needed? | Icon Labs. (n.d.). ICON Labs. Retrieved May 22, 2021, from https://www.iconlabs.com/security-requirements-embedded-devices-%E2%80%93-what-really-needed

Comments