Skip to content
Global Semiconductor Alliance Logo
  • Leadership
    • Board of Directors
    • Advisory Group
    • Executive Management
    • Councils
      • APAC
      • EMEA
      • CTO Council
      • CxO Councils
  • Membership
    • Application
    • Why Join
    • Testimonials
    • Speak at an Event
    • Sponsorship Opportunities
    • Exhibitor Opportunities
    • Advertising Opportunities
    • Partner with GSA
    • Member Directory
    • Member News
    • Member Spotlight
  • Interest Groups
    • Artificial Intelligence
    • Automotive
    • Intellectual Property
    • Internet of Things
  • Events
    • Calendar
    • Awards
    • Past Events
    • Sponsor an Event
  • WLI
    • CEO Pledge
    • Speaker’s Bureau
    • University Programs
    • WLI Committees
    • WLI Directory
    • WLI Events
    • Women’s Leadership Council
  • Resources
    • About
    • Calendar
    • Directories
    • Financial Data
    • Technology & Benchmark Surveys
    • End Market Reports
    • Forum
    • Highlights
    • Store
    • Semismatter.com
    • Contact Us
  • Services
    • Investor Relations
    • Public Relations
  • LoginMembers can login here.
  • Leadership
    • Board of Directors
    • Advisory Group
    • Executive Management
    • Councils
      • APAC
      • EMEA
      • CTO Council
      • CxO Councils
  • Membership
    • Application
    • Why Join
    • Testimonials
    • Speak at an Event
    • Sponsorship Opportunities
    • Exhibitor Opportunities
    • Advertising Opportunities
    • Partner with GSA
    • Member Directory
    • Member News
    • Member Spotlight
  • Interest Groups
    • Artificial Intelligence
    • Automotive
    • Intellectual Property
    • Internet of Things
  • Events
    • Calendar
    • Awards
    • Past Events
    • Sponsor an Event
  • WLI
    • CEO Pledge
    • Speaker’s Bureau
    • University Programs
    • WLI Committees
    • WLI Directory
    • WLI Events
    • Women’s Leadership Council
  • Resources
    • About
    • Calendar
    • Directories
    • Financial Data
    • Technology & Benchmark Surveys
    • End Market Reports
    • Forum
    • Highlights
    • Store
    • Semismatter.com
    • Contact Us
  • Services
    • Investor Relations
    • Public Relations
  • LoginMembers can login here.

TIES

Security Threats, Regulations, Standards & Assurance Methods For Automotive Applications

Contact Shungo Saito at ssaito@gsaglobal.org if interested in joining this SWG.

Security Threats, Regulations, Standards & Assurance Methods For Automotive ApplicationsBenjamin Gaylor2022-04-21T08:06:15-05:00

WP-24: Scalable and Easy to Use Certification (Multiple Variants per Vertical)

WP-24: Scalable and Easy to Use Certification (Multiple Variants per Vertical) Status: Team formation in progress Many IoT verticals see security becoming a key factor. Connected products are major targets for criminals wanting to access valuable data gathered or cause denial of service and demand ransom. These verticals include Consumer, Industrial and connected Automotive vehicles. However, in-depth benchmarking of security “claims” made by different vendors remains difficult for customers, which can lead to unfortunate product choices that have a bad effect on end users or the society at large. Largely, this is down to Read More

WP-24: Scalable and Easy to Use Certification (Multiple Variants per Vertical)Shungo Saito2022-07-11T12:00:37-05:00

WP-23: Scaling trusted IoT device provisioning with TPM as the device trust anchor

WP-23: Scaling trusted IoT device provisioning with TPM as the device trust anchor Status: Team formation in progress IoT provisioning at scale requires seamless device onboarding that is secured and primed for automated operation and lifecycle management.  Achieving these requires at minimum industry aware device engineering and customizations, an identity provider for credentials lifecycle management, supply chain protections, and above all a hardware root of trust silicon to anchor trust in the device.  Using the TPM as the hardware root of trust silicon, this whitepaper provides a provisioning blueprint that is adaptable to any Read More

WP-23: Scaling trusted IoT device provisioning with TPM as the device trust anchorShungo Saito2022-07-11T11:58:10-05:00

WP-22: Rack-n-Stack in the Datacenter with Secure Element in Flash supply chain trust

WP-22: Rack-n-Stack in the Datacenter with Secure Element in Flash supply chain trust Status: Team formation in progress Datacenter providers are transforming to new Bare-Metal-as-a-Service models that bring new threats to a traditionally locked environment.  To secure this landscape and to provide remote reconfiguration capabilities necessary for this new model, simplified approaches need to challenge legacy security architectures.  This paper will highlight how remote management of new secure elements in flash memory can simplified assurance and reconfigurability of platform code. Micron Jeff (L) Siemens Ranier (O) Siemens Wolfgang (O) Privafy James (L) Read More

WP-22: Rack-n-Stack in the Datacenter with Secure Element in Flash supply chain trustShungo Saito2022-06-16T15:01:14-05:00

WP-21: Converging IT and OT credential management ICAM solutions for Aero & Defense

WP-21: Converging IT and OT credential management ICAM solutions for Aero & Defense Status: Team formation in progress The US Government has various initiatives to develop, deliver, and sustain training, testing, and information operations capabilities intended to enhance readiness across the operational spectrum.  This paper addresses application of HSM based vault and key orchestration solutions and associated ecosystem components necessary to support IoT at the Point of Service.   The specific focus of the solution in this case is control and credentialing of machine Identity or (ICAM).  This allows the US Government to have a Read More

WP-21: Converging IT and OT credential management ICAM solutions for Aero & DefenseShungo Saito2022-08-09T15:33:02-05:00

WP-20: Trust Framework for TIES (Internal Framework Document)

WP-20: Trust Framework for TIES (Internal Framework Document) Status: Whitepaper draft in progress Like the industry in general, the TIES group is focused on enabling trusted and secure IoT services by providing scalable and collaborative solutions built on the foundation of hardware roots of trust integrated in wide range of semiconductor chips.  SWG-03 is proposing a trust framework intended to abstract out any specific technology or vertical requirements and aid TIES as a guiding framework document intended to scale to all use cases and to allow adoption of Roots of Trust as required.  It will Read More

WP-20: Trust Framework for TIES (Internal Framework Document)Shungo Saito2023-01-27T13:38:48-06:00

WP-19: Using a Virtual Identifier Thread for Root of Trust and Reliability

WP-19: Using a Virtual Identifier Thread for Root of Trust and Reliability Status: Review & Testimonials The security and reliability of any electronic device is only as good as its weakest link.  If an electronic device fails, contains counterfeit components or suffers a security attack, we need to use all available data at the single device (die, package, PCB, …) level to make a forensic examination to determine that weakest link.  Fortunately, we can already do this using virtual identifiers which are derived from a location on a parent, e.g., wafer ID + XY.  We Read More

WP-19: Using a Virtual Identifier Thread for Root of Trust and ReliabilityShungo Saito2023-02-07T12:17:32-06:00

WP-18: Zero Touch Secure Device Onboarding for Industrial Edge Devices

WP-18: Zero Touch Secure Device Onboarding for Industrial Edge Devices Status: Team formation in progress Secure Device Onboarding is the process of installing secrets and configuration data into a device so that the device is able to connect and interact securely with an IoT platform. The IoT platform is used by the device owner to manage the device by: patching security vulnerabilities; installing or updating software; retrieving sensor data; by interacting with actuators; etc. Automatic onboarding mechanisms are invoked autonomously and performs only limited, specific, interactions with its environment to complete. Intel Tom Read More

WP-18: Zero Touch Secure Device Onboarding for Industrial Edge DevicesShungo Saito2022-06-16T14:57:21-05:00

WP-17: Adding Blockchain for Trusted Traceability of PCB and Systems

WP-17: Adding Blockchain for Trusted Traceability of PCB and Systems Status: Team formation in progress In today’s diverse manufacturing, logistics and just-in-time (“JIT”) inventory environment, assurance of a device’s origin and subsequent history has become a critical challenge. This assurance has the added benefit of reduced reliance on physically tracking devices, or unreliable paper trails, through the supply chain as well as reduced cost and service time. Blockchain technology is a natural solution to provide supply chain attestation and component provenance. Intel Tom (L) Oracle Christophe (O) Siemens Steffen (O) Siemens Wolfgang (O) Read More

WP-17: Adding Blockchain for Trusted Traceability of PCB and SystemsShungo Saito2022-08-09T15:30:55-05:00

WP-16: Anchoring your Supply Chain traceability with Roots of Trust

WP-16: Anchoring your PCB Supply Chain traceability with Roots of Trust Status: Review & Edits In today’s diverse manufacturing, logistics and just-in-time (“JIT”) inventory environment, assurance of a device’s origin (such as a reference the Legal Entity and GS1) and subsequent Blockchain history recording the chain of custody, is important for authenticity.  Each asset needs to have a unique, virtual Identifier that is used to track through the supply chain and is tied to a physical root of trust. As soon as the component is singulated from the parent (such as the die from the Read More

WP-16: Anchoring your Supply Chain traceability with Roots of TrustShungo Saito2022-11-07T15:29:32-06:00
12Next
WeChat
Stay Connected!

Stay Connected

GSA Stay Connected Sign Up

WLI Logo
WeChat
Privacy Policy | Terms of Use
Copyright GSA All Rights Reserved.
This website uses cookies and third party services. Ok