All posts by Christian Krieber

EBV Director Segment Identification. Driven by the vision of a secure and inter-connected future with innovative identification solutions and products! My updates address all trends and topics related to the identification segment.

IoT Security Coverimage
Developing IoT devices without security is like cooking fish&chips without a fryer – the result is hardly going to be perfect. With millions of connections and objects that speak to each other you really want to make sure that your products are immune to hacking, cloning and counterfeiting. Achieving this needs clever strategies that enable you to clearly identify electronic objects. In order to enable companies to gain easy access to personalized security hardware, EBV has joined forces with Infineon and Data I/O to create a new supply chain serviceRead More
Wow, that headline sounds dramatic. Will we really need to battle our own connected kitchen appliances, smartwatches and printers at some point? To answer this questions let’s assess some recent events. Taking Out Some Of The Most Frequently Visited Internet Services With One Attack Just a few weeks back a Distributed Denial of Service (DDoS) attack on Domain Name System (DNS) service provider DynDNS caused a major outage of a number of well-known internet pages and brands (e.g. Amazon, PayPal, Spotify, Soundcloud, Twitter). For those not familiar with the termRead More
Yes, the IoT will spark billions of new connections. Yes, there will be tons of unattended and autonomous devices connected to the internet that need to be secured. And yes everybody knows it. So why do we still see headlines about hacks popping up on a daily basis? Because implementing security isn’t easy nor is it cheap. Semiconductor manufacturers have understood this problem and are developing solutions in order to supply components that enable cost efficient and effortless implementation of protective features into applications. The latest “weapon” for the fightRead More
TLS & Induytry 4.0 / IoT
Secure communication is a prerequisites for Industry 4.0 applications. That bold statement becomes even clearer if we compare the impact of a hacker attack on personal, private IoT applications and industrial IoT (IIoT) applications. Malicious access to your personal email account is bad news for you and in case of your business mails for the department you are working for. A successful attack on a company however can cause big losses through espionage, cloning or slowed down production – which will eventually be bad news for a lot of peopleRead More
For the Identification Segment 2015 has been as exciting as it gets – we have seen some major highlights, security flaws, hacker attacks and remarkable new semiconductor solutions. The IoT is still the defining market trend but there have been several other happenings under the huge roof of the interconnectivity of everything which are well worth taking a look back on.  This year’s huge demand from diverse customers for IoT solutions accelerated the number of new industrial microcontrollers with integrated security features on board. In addition, we have seen theRead More
After last years hype around IoT technology two things became clear: IoT is the defining trend of the next years and security is a major challenge within it. While security software might be sufficient in some cases there is usually no way around implementing security hardware in applications in order to add the necessary protection to a device.   Having said that, there is the next issue: Affordability of security hardware. Security chips will only be implemented into products if the required expenses and efforts are reasonable. Solutions which create aRead More
Got internet? Then you will probably have read about the Jeep Cherokee hack performed by Charlie Miller (Security Engineer, Twitter) and Chris Valasek (Director of Vehicle Safety Research, IOActive) while Andy Greenberg (Senior Writer, Wired) was driving. If not watch the video below! The two hackers have been able to access the car wirelessly and to perform highly dangerous tasks like disabling the brakes and cutting off the engine. Even more concerning, Miller and Valasek claim that it would easily be possible to hack nearly any other 2014/2015 Chrysler model equippedRead More
A crypto system should be secure even if everything about the system, except the key, is public knowledge – Kerckhoff’s law (from the 19th century). There are two basic ways of security systems: symmetric and asymmetric.  Both rely on Kerhoff’s law using secret keys to ensure security. Symmetric systems use the same key on host and client side and offer fast and high throughput as well as efficient security implementation. At the same time symmetric security comes with the trade-off that once a key becomes public the system is not safeRead More
Two weeks ago we defined several questions to find out if your application needs security. Now it’s time to think about what to consider when protecting a system. We created an infographic examining the 6 most important questions. The key to security is defining the perfect mixture of hardware and software security measures in order to keep the system safe and to minimise the expenses for protection. To do so you need to implement security into your design from the beginning and think of possible attacks and vulnerabilities of yourRead More
The Internet of Things (IoT) was at the peak of Gartner’s Hype Cycle 2014 – just a couple months later it feels like it has fully arrived. More and more devices and applications get connected via Bluetooth, WiFi, NFC and other technologies in order to enhance functionality and usability. Gartner’s Hype Cycle 2014 (image: Gartner) Every new connection is a possible entry point for hackers and has to be secured in some way. Many companies face the challenge of choosing and implementing the adequate security technology for their products and therefore we have collectedRead More