Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI...

7

Transcript of Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI...

Page 1: Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI under HTML5 or QML or external device running in the untrusted zone. Application
Page 2: Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI under HTML5 or QML or external device running in the untrusted zone. Application

Isolation & Segregation

● Client/UI (untrusted)– Risk of code injection (HTML5/QML)

– UI on external devices (Mobiles, Tablets)

Page 3: Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI under HTML5 or QML or external device running in the untrusted zone. Application

Layered Security Architecture

Page 4: Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI under HTML5 or QML or external device running in the untrusted zone. Application

HTML5, QML & Native AppsSecurity framework should make standard operations simple, while keeping complex operations possible.

● Standard Model

Page 5: Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI under HTML5 or QML or external device running in the untrusted zone. Application

Sample Radio Application Startup

● (1+2) Home screen sends an “App Start” request through the corresponding binder to App. Framework service

● (3a+3b) App. Framework starts two processes with a shared

Page 6: Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI under HTML5 or QML or external device running in the untrusted zone. Application

Sample Radio Application Flow

Page 7: Isolation & Segregationiot.bzh/download/public/2016/security/Security-Architecture-AGL20.pdf · UI under HTML5 or QML or external device running in the untrusted zone. Application

Conclusion

● Stong isolation– Untrusted client can only access services through a network interface and never have access

to direct library mapping.