SlideShare a Scribd company logo
1©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
The future of mobile
security
Asaf Ashkenazi
Director, Product Management
Qualcomm Technologies, Inc.
3©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Qualcomm® Security Solutions
Qualcomm Security Solutions and Qualcomm SecureMSM are products of Qualcomm Technologies, Inc.
Qualcomm Technologies offers a
multidimensional security solution
that is designed to help:
• Protect mobile device users and the
security and integrity of their
mobile devices
• Make device security easier
• Enable access to content with strict
copyright protection
Qualcomm®
SecureMSM™
Technology
AuthenticationEnterprise
Theft
Deterrence
Content
Protection
4©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
SecureMSM
5©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Secure
MSM
SecureMSM - Security designed to go deep
Secure boot
• A secure system foundation consists of the hardware platform and
the code that executes on that platform. Unauthorized modification
of that code can lead to a breach of the security system. In order to
deter unauthorized modification or replacement of the system stored
code, SecureMSM incorporates secure boot.
• Qualcomm Technologies’ secure boot is an on-chip tamper resistant
ROM based boot-up process that verifies the authenticity and
integrity of critical code and data stored in flash memory.
• Qualcomm Technologies’ secure boot process gains control of the
system immediately after reset by executing a known code resident
in on-chip ROM. This code is the system’s root of trust that
authenticates the code used by the device.
<code>

6©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
SecureMSM - Security designed to go deep
Trusted execution environment
• Protect the device’s most valuable assets from malware.
• Qualcomm® Secure Execution Environment, using ARM’s
TrustZone technology, is a controlled and separated
environment that allows trusted execution of code.
• This code is executed outside of the device operating
system. QTI’s Secure Execution Environment is designed to
reduce the damage of viruses, Trojans and rootkits.
• Hardware access control to block malware access to
critical devices such as touchscreen, camera and fingerprint
reader.
Secure
MSM
BANKING APP
LOGIN
PASSWORD
login@qualcomm.com
*********
Qualcomm Secure Execution Environment is a product of Qualcomm Technologies, Inc.
7©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
SecureMSM - Security designed to go deep
Cryptographic accelerators
• Hardware data encryption, to enhance the performance
and security of cryptographic operations.
• High-speed cryptographic accelerators, capable of
handling multi-data channels while maintaining context
separations.
• Connects to 256-bit secure hardware key that cannot be
accessed by software running on the device and can only
be used by the cryptographic accelerator.
• An essential part of the device’s security, performance and
power efficiency.
ζ#
Secure
MSM
Hello
World
CPU
8©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Authentication
9©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Your device – your identity
PASS.
BYOD
?
10©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
• Fingerprint
− Sensor on device that captures user’s fingerprint designed to provide
added level of security
• Voiceprint
− Integrated audio solutions with hardware recognize individual voice
patterns
• Iris
− Computer vision technology sophisticated enough to identify unique
attributes of users eyes
• Secure PIN & Anti-Phishing
− Secure UI-based PIN authentication
Authentication solutions
A
C
E
B
D
F
11©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
• Secure location
− Supplemental information to authentication from the hardware to help
prevent tampering
• Secure time
− Tying time periods to device infrastructure that help authenticate users
more securely
Secure location and context
12©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Your Device – Your Identity
User Experience
Multi Authenticators
Attestation
Privacy
13©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Theft prevention
14©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
The FCC: “Epidemic of robberies involving smartphones”
1Source: the Office of the New York State Attorney General, SECURE OUR SMARTPHONES INITIATIVE
2Source: London Metropolitan Police
3Source: FCC, http://www.fcc.gov/document/announcement-new-initiatives-combat-smartphone-and-data-theft
More than 40% of all robberies in
New York City involve smartphones
and other cell phones3
In 2013, nearly half (49%) of
London robberies involved a
mobile device2
Other major cities have similar
statistics, with robberies involving
cell phones comprising 30-40% of
all robberies3
Robberies are, by definition, violent
crimes, and there are many instances of
robberies targeting cell phones resulting
in serious injury or even death3
In 2013, thieves stole an estimated
3.1 million mobile devices in the
United States1
15©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Kill Switch components
Device
Device
Lock
Control
Kill switch Backend
Database
Lock/unlock
16©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Concern #1: Fraudulent kill command
Device
Device
Lock
Control
Kill switch Backend
Database
Locked
17©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Concern #2: Factory reset / re-flash attack
Locked Unlocked
Factory
Reset
PhoneStolen phone
Phone Unlock
Tool
18©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Qualcomm Technologies, Inc. kill switch client*
Built on top of SecureMSM
Kill switch
Guardian
Device
Kill
Function
Authentication
Engine
Lock
Unlock
Kill switch Backend
Database
Inside the device
19©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
For more information on Qualcomm, visit us at:
www.qualcomm.com & www.qualcomm.com/blog
©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
Qualcomm and SecureMSM are trademarks of Qualcomm Incorporated, registered in the United
States and other countries. Uplinq is a trademark of Qualcomm Incorporated. All Qualcomm
Incorporated trademarks are used with permission. Other products and brand names may be
trademarks or registered trademarks of their respective owners.
References in this presentation to “Qualcomm” may mean Qualcomm Incorporated, Qualcomm
Technologies, Inc., and/or other subsidiaries or business units within the Qualcomm corporate
structure, as applicable.
Qualcomm Incorporated includes Qualcomm’s licensing business, QTL, and the vast majority of
its patent portfolio. Qualcomm Technologies, Inc., a wholly-owned subsidiary of Qualcomm
Incorporated, operates, along with its subsidiaries, substantially all of Qualcomm’s engineering,
research and development functions, and substantially all of its product and services businesses,
including its semiconductor business, QCT.
Thank you FOLLOW US ON:

More Related Content

PDF
The Fundamentals of Internet of Everything Connectivity
Qualcomm Developer Network
 
PDF
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7
 
PDF
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Shakacon
 
PPTX
Eclipse Edje Project Status
MicroEJ
 
PPTX
MicroEJ software solution for IoT and embedded devices
MicroEJ
 
PDF
UplinQ - qualcomm® smart gateway the home network as a development platform
Satya Harish
 
PDF
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash
 
PDF
從傳統型IP cam走向智慧型IP cam
HermesDDS
 
The Fundamentals of Internet of Everything Connectivity
Qualcomm Developer Network
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Shakacon
 
Eclipse Edje Project Status
MicroEJ
 
MicroEJ software solution for IoT and embedded devices
MicroEJ
 
UplinQ - qualcomm® smart gateway the home network as a development platform
Satya Harish
 
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash
 
從傳統型IP cam走向智慧型IP cam
HermesDDS
 

What's hot (20)

PDF
Knox Customization Sales Deck
Samsung Biz Mobile
 
PPTX
LENSEC Corporate Presentation 2017
Keith Harris
 
PDF
Galaxy S7/S7 Edge for Businesses
Samsung Biz Mobile
 
PPTX
The Galaxy S6 edge+ and Note 5. Ready for Business.
Samsung Biz Mobile
 
PDF
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
 
PDF
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
L. Duke Golden
 
PPTX
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung Biz Mobile
 
PDF
Sierraware browser isolation
Sierraware
 
PPTX
Step Into Security Webinar - Securing Your Facilities Using Technology
Keith Harris
 
PDF
Step Into Security Webinar - Physical Security Integration & Access Control -...
Keith Harris
 
PDF
Gadgeon profile
SREERAJ NAIR
 
PDF
End Point Security - K7
Prime Infoserv
 
PDF
Samsung knox security_solution_v1_10_0
Javier Gonzalez
 
PPTX
Fortinet ixia ottawa, june 2013
juliankanarek
 
DOC
Copy of [ForKernelWifi]sudharsan-resume-2016
Sudharsan Reddy Yettapu
 
PPTX
[EU] Samsung Enterprise Tech Support
Samsung Biz Mobile
 
PPTX
Samsung KNOX - The Most Secure Android Solution
Samsung Biz Mobile
 
PPTX
Mp company overview 2014 0214 version 3
Ricardo Resnik
 
PDF
The samsung knox platform 0
Javier Gonzalez
 
PDF
Kaspersky Internet Security Multi-Device 2015
Dejan Pogačnik
 
Knox Customization Sales Deck
Samsung Biz Mobile
 
LENSEC Corporate Presentation 2017
Keith Harris
 
Galaxy S7/S7 Edge for Businesses
Samsung Biz Mobile
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
Samsung Biz Mobile
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
L. Duke Golden
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung Biz Mobile
 
Sierraware browser isolation
Sierraware
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Keith Harris
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Keith Harris
 
Gadgeon profile
SREERAJ NAIR
 
End Point Security - K7
Prime Infoserv
 
Samsung knox security_solution_v1_10_0
Javier Gonzalez
 
Fortinet ixia ottawa, june 2013
juliankanarek
 
Copy of [ForKernelWifi]sudharsan-resume-2016
Sudharsan Reddy Yettapu
 
[EU] Samsung Enterprise Tech Support
Samsung Biz Mobile
 
Samsung KNOX - The Most Secure Android Solution
Samsung Biz Mobile
 
Mp company overview 2014 0214 version 3
Ricardo Resnik
 
The samsung knox platform 0
Javier Gonzalez
 
Kaspersky Internet Security Multi-Device 2015
Dejan Pogačnik
 
Ad

Similar to The Future Mobile Security (20)

PDF
Mobile Security Qualcom mr. patrick tsie - qualcomm
Tien Hoang
 
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
PDF
The Evolution of Mobile Security
Samsung Business USA
 
PPTX
Mobile Commerce: A Security Perspective
Pragati Rai
 
PDF
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
FIDO Alliance
 
PDF
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Codiax
 
PDF
Bringing Government and Enterprise Security Controls to the Android Endpoint
Hamilton Turner
 
PDF
CodeMotion tel aviv 2015 - burning marshmallows
Ron Munitz
 
PDF
High end security for low-end microcontrollers
Milosch Meriac
 
PDF
Mobile Security Training, Mobile Device Security Training
Tonex
 
PDF
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Matthew Rosenquist
 
PDF
Samsung beyond basic android online 0
Javier Gonzalez
 
PPTX
Mobile security
Stefaan
 
DOCX
Chapter 9Security Vulnerabilities, Threats,and Countermeasur
JinElias52
 
DOCX
Chapter 9 security vulnerabilities, threats,and countermeasur
nand15
 
PDF
Brief Tour about Android Security
National Cheng Kung University
 
PDF
Security issues in_mobile_payment
Prof. Dr. K. Adisesha
 
PDF
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
ICS
 
PPTX
Automotive security (cvta)
Alan Tatourian
 
PDF
Android security maximized by samsung knox
Javier Gonzalez
 
Mobile Security Qualcom mr. patrick tsie - qualcomm
Tien Hoang
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
The Evolution of Mobile Security
Samsung Business USA
 
Mobile Commerce: A Security Perspective
Pragati Rai
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
FIDO Alliance
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Codiax
 
Bringing Government and Enterprise Security Controls to the Android Endpoint
Hamilton Turner
 
CodeMotion tel aviv 2015 - burning marshmallows
Ron Munitz
 
High end security for low-end microcontrollers
Milosch Meriac
 
Mobile Security Training, Mobile Device Security Training
Tonex
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Matthew Rosenquist
 
Samsung beyond basic android online 0
Javier Gonzalez
 
Mobile security
Stefaan
 
Chapter 9Security Vulnerabilities, Threats,and Countermeasur
JinElias52
 
Chapter 9 security vulnerabilities, threats,and countermeasur
nand15
 
Brief Tour about Android Security
National Cheng Kung University
 
Security issues in_mobile_payment
Prof. Dr. K. Adisesha
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
ICS
 
Automotive security (cvta)
Alan Tatourian
 
Android security maximized by samsung knox
Javier Gonzalez
 
Ad

More from Qualcomm Developer Network (20)

PPTX
How to take advantage of XR over 5G: Understanding XR Viewers
Qualcomm Developer Network
 
PDF
Balancing Power & Performance Webinar
Qualcomm Developer Network
 
PPTX
What consumers want in their next XR device
Qualcomm Developer Network
 
PPTX
More Immersive XR through Split-Rendering
Qualcomm Developer Network
 
PPTX
Making an on-device personal assistant a reality
Qualcomm Developer Network
 
PPTX
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Qualcomm Developer Network
 
PDF
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 3
Qualcomm Developer Network
 
PDF
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 2
Qualcomm Developer Network
 
PDF
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 1
Qualcomm Developer Network
 
PDF
Connected Lighting: The Next Frontier in the Internet of Everything
Qualcomm Developer Network
 
PDF
Bring Out the Best in Embedded Computing
Qualcomm Developer Network
 
PDF
Android Tools for Qualcomm Snapdragon Processors
Qualcomm Developer Network
 
PDF
Qualcomm Snapdragon Processors: A Super Gaming Platform
Qualcomm Developer Network
 
PDF
How to Minimize Your App’s Power Consumption
Qualcomm Developer Network
 
PDF
LTE Broadcast/Multicast for Live Events & More
Qualcomm Developer Network
 
PDF
Get Educated on Education Apps
Qualcomm Developer Network
 
PDF
Bringing Mobile Vision to Wearables
Qualcomm Developer Network
 
PDF
Introduction to Qualcomm Vuforia Mobile Vision Platform: Toy Recognition
Qualcomm Developer Network
 
PDF
Using Qualcomm Vuforia to Build Breakthrough Mobile Experiences
Qualcomm Developer Network
 
PDF
Wireless Audio: A Killer App for the Internet of Everything
Qualcomm Developer Network
 
How to take advantage of XR over 5G: Understanding XR Viewers
Qualcomm Developer Network
 
Balancing Power & Performance Webinar
Qualcomm Developer Network
 
What consumers want in their next XR device
Qualcomm Developer Network
 
More Immersive XR through Split-Rendering
Qualcomm Developer Network
 
Making an on-device personal assistant a reality
Qualcomm Developer Network
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Qualcomm Developer Network
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 3
Qualcomm Developer Network
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 2
Qualcomm Developer Network
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 1
Qualcomm Developer Network
 
Connected Lighting: The Next Frontier in the Internet of Everything
Qualcomm Developer Network
 
Bring Out the Best in Embedded Computing
Qualcomm Developer Network
 
Android Tools for Qualcomm Snapdragon Processors
Qualcomm Developer Network
 
Qualcomm Snapdragon Processors: A Super Gaming Platform
Qualcomm Developer Network
 
How to Minimize Your App’s Power Consumption
Qualcomm Developer Network
 
LTE Broadcast/Multicast for Live Events & More
Qualcomm Developer Network
 
Get Educated on Education Apps
Qualcomm Developer Network
 
Bringing Mobile Vision to Wearables
Qualcomm Developer Network
 
Introduction to Qualcomm Vuforia Mobile Vision Platform: Toy Recognition
Qualcomm Developer Network
 
Using Qualcomm Vuforia to Build Breakthrough Mobile Experiences
Qualcomm Developer Network
 
Wireless Audio: A Killer App for the Internet of Everything
Qualcomm Developer Network
 

Recently uploaded (20)

PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
DOCX
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
PPTX
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 

The Future Mobile Security

  • 1. 1©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved.
  • 2. The future of mobile security Asaf Ashkenazi Director, Product Management Qualcomm Technologies, Inc.
  • 3. 3©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Qualcomm® Security Solutions Qualcomm Security Solutions and Qualcomm SecureMSM are products of Qualcomm Technologies, Inc. Qualcomm Technologies offers a multidimensional security solution that is designed to help: • Protect mobile device users and the security and integrity of their mobile devices • Make device security easier • Enable access to content with strict copyright protection Qualcomm® SecureMSM™ Technology AuthenticationEnterprise Theft Deterrence Content Protection
  • 4. 4©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. SecureMSM
  • 5. 5©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Secure MSM SecureMSM - Security designed to go deep Secure boot • A secure system foundation consists of the hardware platform and the code that executes on that platform. Unauthorized modification of that code can lead to a breach of the security system. In order to deter unauthorized modification or replacement of the system stored code, SecureMSM incorporates secure boot. • Qualcomm Technologies’ secure boot is an on-chip tamper resistant ROM based boot-up process that verifies the authenticity and integrity of critical code and data stored in flash memory. • Qualcomm Technologies’ secure boot process gains control of the system immediately after reset by executing a known code resident in on-chip ROM. This code is the system’s root of trust that authenticates the code used by the device. <code> 
  • 6. 6©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. SecureMSM - Security designed to go deep Trusted execution environment • Protect the device’s most valuable assets from malware. • Qualcomm® Secure Execution Environment, using ARM’s TrustZone technology, is a controlled and separated environment that allows trusted execution of code. • This code is executed outside of the device operating system. QTI’s Secure Execution Environment is designed to reduce the damage of viruses, Trojans and rootkits. • Hardware access control to block malware access to critical devices such as touchscreen, camera and fingerprint reader. Secure MSM BANKING APP LOGIN PASSWORD [email protected] ********* Qualcomm Secure Execution Environment is a product of Qualcomm Technologies, Inc.
  • 7. 7©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. SecureMSM - Security designed to go deep Cryptographic accelerators • Hardware data encryption, to enhance the performance and security of cryptographic operations. • High-speed cryptographic accelerators, capable of handling multi-data channels while maintaining context separations. • Connects to 256-bit secure hardware key that cannot be accessed by software running on the device and can only be used by the cryptographic accelerator. • An essential part of the device’s security, performance and power efficiency. ζ# Secure MSM Hello World CPU
  • 8. 8©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Authentication
  • 9. 9©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Your device – your identity PASS. BYOD ?
  • 10. 10©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. • Fingerprint − Sensor on device that captures user’s fingerprint designed to provide added level of security • Voiceprint − Integrated audio solutions with hardware recognize individual voice patterns • Iris − Computer vision technology sophisticated enough to identify unique attributes of users eyes • Secure PIN & Anti-Phishing − Secure UI-based PIN authentication Authentication solutions A C E B D F
  • 11. 11©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. • Secure location − Supplemental information to authentication from the hardware to help prevent tampering • Secure time − Tying time periods to device infrastructure that help authenticate users more securely Secure location and context
  • 12. 12©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Your Device – Your Identity User Experience Multi Authenticators Attestation Privacy
  • 13. 13©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Theft prevention
  • 14. 14©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. The FCC: “Epidemic of robberies involving smartphones” 1Source: the Office of the New York State Attorney General, SECURE OUR SMARTPHONES INITIATIVE 2Source: London Metropolitan Police 3Source: FCC, http://www.fcc.gov/document/announcement-new-initiatives-combat-smartphone-and-data-theft More than 40% of all robberies in New York City involve smartphones and other cell phones3 In 2013, nearly half (49%) of London robberies involved a mobile device2 Other major cities have similar statistics, with robberies involving cell phones comprising 30-40% of all robberies3 Robberies are, by definition, violent crimes, and there are many instances of robberies targeting cell phones resulting in serious injury or even death3 In 2013, thieves stole an estimated 3.1 million mobile devices in the United States1
  • 15. 15©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Kill Switch components Device Device Lock Control Kill switch Backend Database Lock/unlock
  • 16. 16©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Concern #1: Fraudulent kill command Device Device Lock Control Kill switch Backend Database Locked
  • 17. 17©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Concern #2: Factory reset / re-flash attack Locked Unlocked Factory Reset PhoneStolen phone Phone Unlock Tool
  • 18. 18©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Qualcomm Technologies, Inc. kill switch client* Built on top of SecureMSM Kill switch Guardian Device Kill Function Authentication Engine Lock Unlock Kill switch Backend Database Inside the device
  • 19. 19©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. For more information on Qualcomm, visit us at: www.qualcomm.com & www.qualcomm.com/blog ©2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All Rights Reserved. Qualcomm and SecureMSM are trademarks of Qualcomm Incorporated, registered in the United States and other countries. Uplinq is a trademark of Qualcomm Incorporated. All Qualcomm Incorporated trademarks are used with permission. Other products and brand names may be trademarks or registered trademarks of their respective owners. References in this presentation to “Qualcomm” may mean Qualcomm Incorporated, Qualcomm Technologies, Inc., and/or other subsidiaries or business units within the Qualcomm corporate structure, as applicable. Qualcomm Incorporated includes Qualcomm’s licensing business, QTL, and the vast majority of its patent portfolio. Qualcomm Technologies, Inc., a wholly-owned subsidiary of Qualcomm Incorporated, operates, along with its subsidiaries, substantially all of Qualcomm’s engineering, research and development functions, and substantially all of its product and services businesses, including its semiconductor business, QCT. Thank you FOLLOW US ON: