Every day seems to bring a new, connected device to the market promising to improve our lives. It might be a doorbell, a car, or a drone, but whatever it is, to make it relevant in today's world it must be connected and as a consequence, 'smart'.

However, the flipside of this accessibility is vulnerability, as providing access for a known party, by definition, means it could also be accessed by those who would wish to do harm.

We can all agree then that security for these devices is a must. This is where the idea for a Trusted Execution Environment (TEE) stems from. A TEE sits at the heart of connected embedded devices and provides a secure area within which sensitive data is stored, processed and protected. The TEE ensures that this is an isolated, trusted environment - enabling end-to-end security by offering isolated, safe execution of authorized software. In other words, the TEE represents a region of an SoC that is separate, allowing for the execution of trusted applications (TAs) in a safe, secure silo.

However, programming applications to make use of this can be challenging, and without a common method of doing so, applications will need to be custom developed for different hardware, which adds complexity and extends time to market. To combat this, a consortium of companies have come together to form GlobalPlatform, creating application programming interfaces (APIs) for TEEs. This makes it easier for developers to make use of the TEE, enabling interoperability, enhancing ease of adoption and reducing the time to market.

For this to be possible, it's important then that TEEs are created that fully conform to the GlobalPlatform standard.

In addition, however, we believe that what is needed is a 'multi-trust' TEE - that is where trusted applications are not just placed together in a single secure environment, but are isolated from each other in individual, protected silos. This means that if an attacker does compromise one application the others are not compromised at the same time.

This is of critical importance in cases such as a set top box, where multiple end-user applications could reside from different vendors, each with sensitive data to protect, such as payment details or a DRM protected video stream.

We call this 'security by separation'.

Hardware virtualization, as offered by Imagination's OmniShield technology as found in MIPS CPUs and PowerVR GPUs, makes it possible to create these secure 'domains' in which trusted applications can securely reside. Our blog post here goes into more detail on the business benefits of this and how it would be implemented in a home gateway.

On Tuesday 12 September, Imagination will be participating in the 5 annual Trusted Execution Environment (TEE) Seminar, presented by GlobalPlatform, at the Sheraton Grand Dongcheng Hotel in Beijing.

Here, we will demonstrate our GlobalPlatform Compliant TEE for MIPS solution. Created in combination with Sierraware, a pioneer in virtualization and security, the SierraTEE is built on Imagination's MIPS CPUs and is fully GlobalPlatform compliant.

At the event, Volker Politz, the vice president of segment marketing at Imagination will moderate a panel discussion and Q&A session on DRM, and its importance of creating compliant hardware for mobile devices, tablets, set-top boxes and smart TV.

If you're in the Beijing area and want to understand the challenges in protected connected devices and see working solutions first-hand, you'll want to be at this event.

To learn more about it go to this page. You can follow the link at the bottom of the to register.

We have limited free tickets available so if you'd like to attend please get in touch at: marcomms@imgtec.com

Also, to stay up-to-date with news from Imagination you can follow us on social media on Twitter @ImaginationTech and on LinkedIn, Facebook and Google+.

Imagination Technologies Group plc published this content on 08 September 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 08 September 2017 11:32:11 UTC.

Original documenthttps://www.imgtec.com/blog/why-imagination-is-needed-to-secure-tomorrows-connected-devices/

Public permalinkhttp://www.publicnow.com/view/E2C228E0E08001F23B9CEEBB44C310E8D34A3CEE