feature article
Subscribe Now

Sequitur Security Is a Package Deal

Software Takes a Soup-to-Nuts Approach to IoT Security

“My greatest pain in life is that I will never be able to see myself perform live.” – Kanye West

When everyone else took Spanish classes in high school, I took Latin. That prepared me for a life of translating classic literature (nope), correcting Catholic priests (not ever), deciphering legal phrases (more often than I’d like), and acing entire Jeopardy! categories (all the time).

It also taught me just enough to know that sequitur means “following in sequence,” a term most often used in the negative, as in non sequitur

The dozen souls toiling at the titular startup company outside of Seattle know that, too, which is why they chose it for their company name. In their view, Sequitur Labs’s security code is the next logical step in the process of securing embedded devices. 

Security, alas, is a never-ending struggle to out-think the bad guys. That’s hard enough on a “real” computer, where you’ve got lots of RAM, lots of CPU horsepower, lots of tools, and lots of examples (good and bad) of how it’s done. It’s harder when you’re securing unique embedded or IoT devices where there’s no one else to turn to for advice. Norton McAfee Kaspersky can’t help you with your HVAC controls, elevator controller, or security cameras. 

Security is also like screen doors on a submarine. Leave even one hatch open and the whole boat sinks. It’s not enough to plug most of the holes. Like Pokémon, you gotta get ’em all. That’s why Sequitur Labs takes a holistic approach and provides an entire package of security features rolled up into one deliverable. 

It’s not a lightweight package for 8-bit MCUs or thermostats. It requires a 32-bit processor – specifically, a Cortex A-series CPU with TrustZone – and several megabytes of RAM. But it shields devices against boot-time attacks, malware intrusions, malicious OTA updates, IP exfiltration, device-to-cloud communication, and more. 

Ah, for the old days. “You used to just be able to lock down the network and prevent malicious traffic” and your device was safe, says Sequitur CEO Philip Attfield. “Nothing was done at the device level.” Not so anymore. Now, attacks come from all angles, including from inside the house. That means there are a lot of different problems to solve. Problems that have nothing in common, apart from the fact they’re all security related. 

One key area that customers worry about is protecting their own intellectual property. With the rise of ML-enabled devices at the edge, a lot of products in consumers’ hands contain the results of original AI research and development. Vendors don’t want that IP to go walkabout. How to protect their models and algorithms from piracy, while still allowing updates, communication, and cloud connectivity? 

Sequitur Labs says its security package covers three broad areas. First, there’s the product’s design phase, which includes a secure dual-stage boot loader, memory partitioning and isolation, its own secure operating system (called CoreTEE), encryption/decryption, unique device IDs, device failover in case of a failed boot, and root of trust. (A general-purpose operating system such as Linux is assumed but is treated as insecure.) 

Second, there’s the day-to-day operating phase that encompasses antipiracy measures, authentication, over-the-air updates, firmware rollbacks, tamper detection, secure APIs, certificate and key provisioning for manufacturing, and device-to-cloud communication. 

Finally, Sequitur’s “lifecycle management” phase takes care of updates, health monitoring, enrollment, metrics, and the company’s own Device Monitor Cloud Service (available in Q4). 

Sequitur’s thorough approach to device security means it’s not invisible. You don’t just slap it on and rest easy in the knowledge that your device is now invulnerable. Programmers have to learn to work with it, a bit like learning a new RTOS with its unique function calls. Naturally, Sequitur says this is a simple process, and “it’s a lot easier than learning and implementing security protocols yourself,” says Attfield. 

The man has a point. Security is a whole new frontier for most developers. We haven’t been trained on security and, for the most part, we don’t have a clue how to develop good security measures. Even if we did have the ambition and the know-how, who has the time? Our bosses expect products to be secure, but deadlines and budgets don’t seem to expand in response. 

That makes third-party security a good bet. Like licensing an RTOS or a CPU architecture, security suites might be one of those things best left to the outside experts. Security vulnerabilities keep changing, so developing in-house countermeasures means never getting off the update treadmill. Once you start, you can never be finished, and all security leaks become your responsibility. Better to hand that headache over to someone else willing and able to accept the pain. 

 

One thought on “Sequitur Security Is a Package Deal”

  1. But how do we trust the 3rd party security company – over time?
    But DIY is heavy as Jim said: see this ETSI Security doc:
    https://bit.ly/3f8xExZ

    A Good Read for embedded guys so you’ll be ready when your bosses panic over their IoT device liabilities.

Leave a Reply

featured blogs
Sep 27, 2022
Heterogeneous integration and SoC (system on chip) are two ways to design and build silicon chips. Heterogeneous integration aims to counter the growing expense and complexity of SoC design by taking a modular approach using advanced packaging technology. For the past two dec...
Sep 22, 2022
On Monday 26 September 2022, Earth and Jupiter will be only 365 million miles apart, which is around half of their worst-case separation....
Sep 22, 2022
Learn how to design safe and stylish interior and exterior automotive lighting systems with a look at important lighting categories and lighting design tools. The post How to Design Safe, Appealing, Functional Automotive Lighting Systems appeared first on From Silicon To Sof...

featured video

Embracing Photonics and Fiber Optics in Aerospace and Defense Applications

Sponsored by Synopsys

We sat down with Jigesh Patel, Technical Marketing Manager of Photonic Solutions at Synopsys, to learn the challenges and benefits of using photonics in Aerospace and Defense systems.

Read the Interview online

featured paper

Algorithm Verification with FPGAs and ASICs

Sponsored by MathWorks

Developing new FPGA and ASIC designs involves implementing new algorithms, which presents challenges for verification for algorithm developers, hardware designers, and verification engineers. This eBook explores different aspects of hardware design verification and how you can use MATLAB and Simulink to reduce development effort and improve the quality of end products.

Click here to read more

featured chalk talk

Expanding SiliconMAX SLM to In-Field

Sponsored by Synopsys

In order to keep up with the rigorous pace of today’s electronic designs, we must have visibility into each step of our IC design lifecycle including debug, bring up and in-field operation. In this episode of Chalk Talk, Amelia Dalton chats with Steve Pateras from Synopsys about in-field infrastructure for silicon lifecycle management, the role that edge analytics play when it comes to in-field optimization, and how cloud analytics, runtime agents and SiliconMAX sensor analytics can provide you more information than ever before for the lifecycle of your IC design.

Click here for more information about SiliconMAX Silicon Lifecycle Management