feature article
Subscribe Now

Sequitur Security Is a Package Deal

Software Takes a Soup-to-Nuts Approach to IoT Security

“My greatest pain in life is that I will never be able to see myself perform live.” – Kanye West

When everyone else took Spanish classes in high school, I took Latin. That prepared me for a life of translating classic literature (nope), correcting Catholic priests (not ever), deciphering legal phrases (more often than I’d like), and acing entire Jeopardy! categories (all the time).

It also taught me just enough to know that sequitur means “following in sequence,” a term most often used in the negative, as in non sequitur

The dozen souls toiling at the titular startup company outside of Seattle know that, too, which is why they chose it for their company name. In their view, Sequitur Labs’s security code is the next logical step in the process of securing embedded devices. 

Security, alas, is a never-ending struggle to out-think the bad guys. That’s hard enough on a “real” computer, where you’ve got lots of RAM, lots of CPU horsepower, lots of tools, and lots of examples (good and bad) of how it’s done. It’s harder when you’re securing unique embedded or IoT devices where there’s no one else to turn to for advice. Norton McAfee Kaspersky can’t help you with your HVAC controls, elevator controller, or security cameras. 

Security is also like screen doors on a submarine. Leave even one hatch open and the whole boat sinks. It’s not enough to plug most of the holes. Like Pokémon, you gotta get ’em all. That’s why Sequitur Labs takes a holistic approach and provides an entire package of security features rolled up into one deliverable. 

It’s not a lightweight package for 8-bit MCUs or thermostats. It requires a 32-bit processor – specifically, a Cortex A-series CPU with TrustZone – and several megabytes of RAM. But it shields devices against boot-time attacks, malware intrusions, malicious OTA updates, IP exfiltration, device-to-cloud communication, and more. 

Ah, for the old days. “You used to just be able to lock down the network and prevent malicious traffic” and your device was safe, says Sequitur CEO Philip Attfield. “Nothing was done at the device level.” Not so anymore. Now, attacks come from all angles, including from inside the house. That means there are a lot of different problems to solve. Problems that have nothing in common, apart from the fact they’re all security related. 

One key area that customers worry about is protecting their own intellectual property. With the rise of ML-enabled devices at the edge, a lot of products in consumers’ hands contain the results of original AI research and development. Vendors don’t want that IP to go walkabout. How to protect their models and algorithms from piracy, while still allowing updates, communication, and cloud connectivity? 

Sequitur Labs says its security package covers three broad areas. First, there’s the product’s design phase, which includes a secure dual-stage boot loader, memory partitioning and isolation, its own secure operating system (called CoreTEE), encryption/decryption, unique device IDs, device failover in case of a failed boot, and root of trust. (A general-purpose operating system such as Linux is assumed but is treated as insecure.) 

Second, there’s the day-to-day operating phase that encompasses antipiracy measures, authentication, over-the-air updates, firmware rollbacks, tamper detection, secure APIs, certificate and key provisioning for manufacturing, and device-to-cloud communication. 

Finally, Sequitur’s “lifecycle management” phase takes care of updates, health monitoring, enrollment, metrics, and the company’s own Device Monitor Cloud Service (available in Q4). 

Sequitur’s thorough approach to device security means it’s not invisible. You don’t just slap it on and rest easy in the knowledge that your device is now invulnerable. Programmers have to learn to work with it, a bit like learning a new RTOS with its unique function calls. Naturally, Sequitur says this is a simple process, and “it’s a lot easier than learning and implementing security protocols yourself,” says Attfield. 

The man has a point. Security is a whole new frontier for most developers. We haven’t been trained on security and, for the most part, we don’t have a clue how to develop good security measures. Even if we did have the ambition and the know-how, who has the time? Our bosses expect products to be secure, but deadlines and budgets don’t seem to expand in response. 

That makes third-party security a good bet. Like licensing an RTOS or a CPU architecture, security suites might be one of those things best left to the outside experts. Security vulnerabilities keep changing, so developing in-house countermeasures means never getting off the update treadmill. Once you start, you can never be finished, and all security leaks become your responsibility. Better to hand that headache over to someone else willing and able to accept the pain. 

 

One thought on “Sequitur Security Is a Package Deal”

  1. But how do we trust the 3rd party security company – over time?
    But DIY is heavy as Jim said: see this ETSI Security doc:
    https://bit.ly/3f8xExZ

    A Good Read for embedded guys so you’ll be ready when your bosses panic over their IoT device liabilities.

Leave a Reply

featured blogs
Oct 21, 2020
You've traveled back in time 65 million years with no way to return. What evidence can you leave to ensure future humans will know of your existence?...
Oct 21, 2020
We'€™re concluding the Online Training Deep Dive blog series, which has been taking the top 15 Online Training courses among students and professors and breaking them down into their different... [[ Click on the title to access the full blog on the Cadence Community site. ...
Oct 20, 2020
In 2020, mobile traffic has skyrocketed everywhere as our planet battles a pandemic. Samtec.com saw nearly double the mobile traffic in the first two quarters than it normally sees. While these levels have dropped off from their peaks in the spring, they have not returned to ...
Oct 16, 2020
[From the last episode: We put together many of the ideas we'€™ve been describing to show the basics of how in-memory compute works.] I'€™m going to take a sec for some commentary before we continue with the last few steps of in-memory compute. The whole point of this web...

featured video

Demo: Inuitive NU4000 SoC with ARC EV Processor Running SLAM and CNN

Sponsored by Synopsys

See Inuitive’s NU4000 3D imaging and vision processor in action. The SoC supports high-quality 3D depth processor engine, SLAM accelerators, computer vision, and deep learning by integrating Synopsys ARC EV processor. In this demo, the NU4000 demonstrates simultaneous 3D sensing, SLAM and CNN functionality by mapping out its environment and localizing the sensor while identifying the objects within it. For more information, visit inuitive-tech.com.

Click here for more information about DesignWare ARC EV Processors for Embedded Vision

featured paper

Fundamentals of Precision ADC Noise Analysis

Sponsored by Texas Instruments

Build your knowledge of noise performance with high-resolution delta-sigma ADCs. This e-book covers types of ADC noise, how other components contribute noise to the system, and how these noise sources interact with each other.

Click here to download the whitepaper

Featured Chalk Talk

General Port Protection

Sponsored by Mouser Electronics and Littelfuse

In today’s complex designs, port protection can be a challenge. High-speed data, low-speed data, and power ports need protection from ESD, power faults, and more. In this episode of Chalk Talk, Amelia Dalton chats with Todd Phillips from Littelfuse about port protection for your next system design.

Click here for more information about port protection from Littelfuse.