Hardware Security in Connected World
Jakub Bartoszek
Head of Solutions Architects, B2B Presales support
Samsung R&D Institute Poland
□
What is the Connected World?
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
The Fourth Industrial Revolution
Trends: Convergence & Risk
Mobility is where these trends converge.
At Samsung we are applying the lessons learned from the first wave of mobility to these evolutions.
• Speed
• Near-zero latency
• Unknown, untrusted networks5G
IoT
AI
• 25+ billion endpoints by 2020
• Increased attack surfaces
• Different endpoints to support
• Beyond personal digital assistants
• Cognitive decision making
• Do you trust the apps and the
algorithms?
• Tampering can have catastrophic
downstream effects.
Every network-connected endpoint
must be inherently secure.
Mobile security has never been a
more urgent concern than it is today.
Risk Mitigation
Risk Mitigation in Connected World
Comprehensive security strategy
• Validated, proven hardware
• Validated, secure firmware
• Secure transport/networks
• Security management infrastructure:
• Unified Endpoint Management
• Mobile Threat Defense (AI is your friend)
• Buy into an open-standards ecosystem (plug, play, swap as needed)
The Importance of hardware-based Security
Truly secure computing must address all
layers of your devices
Hardware
• Warranty Bit
• Device Unique Root Key
• Samsung Secure Boot Key
Application Layer
• Knox Workspace Container
• Sensitive Data Protection (during runtime)
• On Disk Encryption
• SE Android
• Client Certificate Management
• Keystore Management
• Device Attestation
• Realtime Kernel Protection
Firmware / Operating System
• Firmware Rollback Prevention
• Trusted and Verified Boot
• Secure Boot
Knox Security: The long story of securing your world
There are critical steps to ensure the integrity of any device.
Hardware Root of Trust
• Irretrievable device unique
hardware keys are built in
 only accessible via
TrustZone
Build Trust
• Verifies all booting
components using
TrustZone
• If compromised,
Workspace container
gets locked
Maintain Trust
• Prevent unauthorized
Kernel access or code
modification
• Sensitive data are kept
encrypted even after
powered on
• Verify the integrity of
device security using
EMM
 Measurements
guaranteed per device
Building trust
Manufacturing time Booting time Run time
Maintaining trust
Why Real-time Protection
It is critical to protect the device and its data while in
use, as people do not power down devices often.
• All data encrypted
• Integrity check at boot-up
• All data decrypted
• No kernel protection
• All data encrypted
• Integrity check at boot-up
• Personal data decrypted, but
important work data stays
encrypted  decrypted when
Knox container is unlocked
• The kernel is protected in
run-time
Power
ON
AOSP
Samsung
Knox
Power
OFF
Trusted by Experts and Government Bodies
of Any Mobile Security Platform by
Meets stringent government security standards worldwide including MDFPP of NIAP
Most “Strong” Ratings
Mobile Device Security: A Comparison of Platforms 2019
Securing the Next Mobile Economy
Intelligence into Security & Management
Introducing Knox Analytics
“Adaptive” and “Automated” Security and Management for 5G / IoT
“Adaptive” and “Automated” Security and Management for 5G / IoT
Thank You
Jakub Bartoszek
j.bartoszek@samsung.com

More Related Content

PPTX
Building a Hacker Resistant Network
PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
PPTX
Mobile device security using transient authentication
PDF
Maemo 6 Platform Security
PDF
What we learned from MISA Ontario 2020 Infosec
PDF
Genian NAC Overview
PDF
Operating System Support for Run-Time Security with a Trusted Execution Envir...
PPTX
Security challenges in d2d communication by ajithkumar vyasarao
Building a Hacker Resistant Network
2012 12-04 --ncc_group_-_mobile_threat_war_room
Mobile device security using transient authentication
Maemo 6 Platform Security
What we learned from MISA Ontario 2020 Infosec
Genian NAC Overview
Operating System Support for Run-Time Security with a Trusted Execution Envir...
Security challenges in d2d communication by ajithkumar vyasarao

What's hot (20)

PPT
Why Go Beyond Encryption
PPTX
​Understanding the Internet of Things
PPTX
Cincinnati window shade technology overview
PPTX
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
PDF
Genian NAC Datasheet
PPT
Final project
PDF
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
PPTX
UniQ-ID Identity and Access Management
PDF
Lecture 5 software to control network
DOCX
kali linix
PDF
Track 5 session 2 - st dev con 2016 - security iot best practices
PDF
z/OS Authorized Code Scanner
PPTX
Security architecture design patterns iltam 2018 - ofer rivlin
PDF
Preventing Stealthy Threats with Next Generation Endpoint Security
PPTX
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
PPTX
TGT#10 - IAST (Short talk) - Eugene Nosenko
PDF
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
PDF
Panda Security - Endpoint Protection Plus
PDF
Blackhat USA Mobile Security Panel 2011
PPT
Understanding Technology Stakeholders
Why Go Beyond Encryption
​Understanding the Internet of Things
Cincinnati window shade technology overview
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Genian NAC Datasheet
Final project
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
UniQ-ID Identity and Access Management
Lecture 5 software to control network
kali linix
Track 5 session 2 - st dev con 2016 - security iot best practices
z/OS Authorized Code Scanner
Security architecture design patterns iltam 2018 - ofer rivlin
Preventing Stealthy Threats with Next Generation Endpoint Security
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
TGT#10 - IAST (Short talk) - Eugene Nosenko
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
Panda Security - Endpoint Protection Plus
Blackhat USA Mobile Security Panel 2011
Understanding Technology Stakeholders
Ad

Similar to Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World (20)

PDF
Samsung knox security_solution_v1_10_0
PDF
Samsung beyond basic android online 0
PDF
Android security maximized by samsung knox
PDF
Secure enterprise mobility
PDF
Enterprise innovation in an ever-expanding mobile world
PDF
The samsung knox platform 0
PDF
The Evolution of Mobile Security
PDF
An overview of the samsung knox platform v1 14
PPTX
Automotive security (cvta)
PPTX
Security for io t apr 29th mentor embedded hangout
PDF
The new era of mega trends securtity
PPTX
Will future vehicles be secure?
PDF
Android Security Maximized by Samsung KNOX
PPTX
Hacking your Connected Car: What you need to know NOW
PDF
Mobile Security: How Secure Is Your Basement?
PPTX
200:1 - Do You Trust Your Mobile Security Odds?
PPT
Track f evolving trusted platforms - arm
PDF
Mobile Security Qualcom mr. patrick tsie - qualcomm
PPTX
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
PDF
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Samsung knox security_solution_v1_10_0
Samsung beyond basic android online 0
Android security maximized by samsung knox
Secure enterprise mobility
Enterprise innovation in an ever-expanding mobile world
The samsung knox platform 0
The Evolution of Mobile Security
An overview of the samsung knox platform v1 14
Automotive security (cvta)
Security for io t apr 29th mentor embedded hangout
The new era of mega trends securtity
Will future vehicles be secure?
Android Security Maximized by Samsung KNOX
Hacking your Connected Car: What you need to know NOW
Mobile Security: How Secure Is Your Basement?
200:1 - Do You Trust Your Mobile Security Odds?
Track f evolving trusted platforms - arm
Mobile Security Qualcom mr. patrick tsie - qualcomm
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Ad

More from Codiax (20)

PDF
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
PDF
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
PDF
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
PDF
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
PDF
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
PDF
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
PDF
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videos
PDF
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
PDF
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
PDF
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
PDF
Matthias Feys (ML6) – Bias in ML: A Technical Intro
PDF
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
PDF
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
PDF
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
PDF
Maciej Marek (Philip Morris International) - The Tools of The Trade
PDF
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
PDF
Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...
PDF
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
PDF
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
PDF
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Matthias Feys (ML6) – Bias in ML: A Technical Intro
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Maciej Marek (Philip Morris International) - The Tools of The Trade
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Jakub Langr (University of Oxford) - Overview of Generative Adversarial Netwo...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server

Recently uploaded (20)

PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
Microsoft User Copilot Training Slide Deck
PPTX
Internet of Everything -Basic concepts details
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Microsoft User Copilot Training Slide Deck
Internet of Everything -Basic concepts details
Convolutional neural network based encoder-decoder for efficient real-time ob...
LMS bot: enhanced learning management systems for improved student learning e...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Improvisation in detection of pomegranate leaf disease using transfer learni...
Co-training pseudo-labeling for text classification with support vector machi...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
EIS-Webinar-Regulated-Industries-2025-08.pdf
Comparative analysis of machine learning models for fake news detection in so...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
Early detection and classification of bone marrow changes in lumbar vertebrae...
Lung cancer patients survival prediction using outlier detection and optimize...
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx

Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World

  • 1. Hardware Security in Connected World Jakub Bartoszek Head of Solutions Architects, B2B Presales support Samsung R&D Institute Poland □
  • 2. What is the Connected World?
  • 5. Trends: Convergence & Risk Mobility is where these trends converge. At Samsung we are applying the lessons learned from the first wave of mobility to these evolutions. • Speed • Near-zero latency • Unknown, untrusted networks5G IoT AI • 25+ billion endpoints by 2020 • Increased attack surfaces • Different endpoints to support • Beyond personal digital assistants • Cognitive decision making • Do you trust the apps and the algorithms? • Tampering can have catastrophic downstream effects.
  • 6. Every network-connected endpoint must be inherently secure. Mobile security has never been a more urgent concern than it is today.
  • 8. Risk Mitigation in Connected World Comprehensive security strategy • Validated, proven hardware • Validated, secure firmware • Secure transport/networks • Security management infrastructure: • Unified Endpoint Management • Mobile Threat Defense (AI is your friend) • Buy into an open-standards ecosystem (plug, play, swap as needed)
  • 9. The Importance of hardware-based Security Truly secure computing must address all layers of your devices Hardware • Warranty Bit • Device Unique Root Key • Samsung Secure Boot Key Application Layer • Knox Workspace Container • Sensitive Data Protection (during runtime) • On Disk Encryption • SE Android • Client Certificate Management • Keystore Management • Device Attestation • Realtime Kernel Protection Firmware / Operating System • Firmware Rollback Prevention • Trusted and Verified Boot • Secure Boot
  • 10. Knox Security: The long story of securing your world There are critical steps to ensure the integrity of any device. Hardware Root of Trust • Irretrievable device unique hardware keys are built in  only accessible via TrustZone Build Trust • Verifies all booting components using TrustZone • If compromised, Workspace container gets locked Maintain Trust • Prevent unauthorized Kernel access or code modification • Sensitive data are kept encrypted even after powered on • Verify the integrity of device security using EMM  Measurements guaranteed per device Building trust Manufacturing time Booting time Run time Maintaining trust
  • 11. Why Real-time Protection It is critical to protect the device and its data while in use, as people do not power down devices often. • All data encrypted • Integrity check at boot-up • All data decrypted • No kernel protection • All data encrypted • Integrity check at boot-up • Personal data decrypted, but important work data stays encrypted  decrypted when Knox container is unlocked • The kernel is protected in run-time Power ON AOSP Samsung Knox Power OFF
  • 12. Trusted by Experts and Government Bodies of Any Mobile Security Platform by Meets stringent government security standards worldwide including MDFPP of NIAP Most “Strong” Ratings Mobile Device Security: A Comparison of Platforms 2019
  • 13. Securing the Next Mobile Economy
  • 15. Introducing Knox Analytics “Adaptive” and “Automated” Security and Management for 5G / IoT
  • 16. “Adaptive” and “Automated” Security and Management for 5G / IoT