feature article
Subscribe Now

Sequitur Security Is a Package Deal

Software Takes a Soup-to-Nuts Approach to IoT Security

“My greatest pain in life is that I will never be able to see myself perform live.” – Kanye West

When everyone else took Spanish classes in high school, I took Latin. That prepared me for a life of translating classic literature (nope), correcting Catholic priests (not ever), deciphering legal phrases (more often than I’d like), and acing entire Jeopardy! categories (all the time).

It also taught me just enough to know that sequitur means “following in sequence,” a term most often used in the negative, as in non sequitur

The dozen souls toiling at the titular startup company outside of Seattle know that, too, which is why they chose it for their company name. In their view, Sequitur Labs’s security code is the next logical step in the process of securing embedded devices. 

Security, alas, is a never-ending struggle to out-think the bad guys. That’s hard enough on a “real” computer, where you’ve got lots of RAM, lots of CPU horsepower, lots of tools, and lots of examples (good and bad) of how it’s done. It’s harder when you’re securing unique embedded or IoT devices where there’s no one else to turn to for advice. Norton McAfee Kaspersky can’t help you with your HVAC controls, elevator controller, or security cameras. 

Security is also like screen doors on a submarine. Leave even one hatch open and the whole boat sinks. It’s not enough to plug most of the holes. Like Pokémon, you gotta get ’em all. That’s why Sequitur Labs takes a holistic approach and provides an entire package of security features rolled up into one deliverable. 

It’s not a lightweight package for 8-bit MCUs or thermostats. It requires a 32-bit processor – specifically, a Cortex A-series CPU with TrustZone – and several megabytes of RAM. But it shields devices against boot-time attacks, malware intrusions, malicious OTA updates, IP exfiltration, device-to-cloud communication, and more. 

Ah, for the old days. “You used to just be able to lock down the network and prevent malicious traffic” and your device was safe, says Sequitur CEO Philip Attfield. “Nothing was done at the device level.” Not so anymore. Now, attacks come from all angles, including from inside the house. That means there are a lot of different problems to solve. Problems that have nothing in common, apart from the fact they’re all security related. 

One key area that customers worry about is protecting their own intellectual property. With the rise of ML-enabled devices at the edge, a lot of products in consumers’ hands contain the results of original AI research and development. Vendors don’t want that IP to go walkabout. How to protect their models and algorithms from piracy, while still allowing updates, communication, and cloud connectivity? 

Sequitur Labs says its security package covers three broad areas. First, there’s the product’s design phase, which includes a secure dual-stage boot loader, memory partitioning and isolation, its own secure operating system (called CoreTEE), encryption/decryption, unique device IDs, device failover in case of a failed boot, and root of trust. (A general-purpose operating system such as Linux is assumed but is treated as insecure.) 

Second, there’s the day-to-day operating phase that encompasses antipiracy measures, authentication, over-the-air updates, firmware rollbacks, tamper detection, secure APIs, certificate and key provisioning for manufacturing, and device-to-cloud communication. 

Finally, Sequitur’s “lifecycle management” phase takes care of updates, health monitoring, enrollment, metrics, and the company’s own Device Monitor Cloud Service (available in Q4). 

Sequitur’s thorough approach to device security means it’s not invisible. You don’t just slap it on and rest easy in the knowledge that your device is now invulnerable. Programmers have to learn to work with it, a bit like learning a new RTOS with its unique function calls. Naturally, Sequitur says this is a simple process, and “it’s a lot easier than learning and implementing security protocols yourself,” says Attfield. 

The man has a point. Security is a whole new frontier for most developers. We haven’t been trained on security and, for the most part, we don’t have a clue how to develop good security measures. Even if we did have the ambition and the know-how, who has the time? Our bosses expect products to be secure, but deadlines and budgets don’t seem to expand in response. 

That makes third-party security a good bet. Like licensing an RTOS or a CPU architecture, security suites might be one of those things best left to the outside experts. Security vulnerabilities keep changing, so developing in-house countermeasures means never getting off the update treadmill. Once you start, you can never be finished, and all security leaks become your responsibility. Better to hand that headache over to someone else willing and able to accept the pain. 

 

One thought on “Sequitur Security Is a Package Deal”

  1. But how do we trust the 3rd party security company – over time?
    But DIY is heavy as Jim said: see this ETSI Security doc:
    https://bit.ly/3f8xExZ

    A Good Read for embedded guys so you’ll be ready when your bosses panic over their IoT device liabilities.

Leave a Reply

featured blogs
Apr 25, 2024
Cadence's seven -year partnership with'¯ Team4Tech '¯has given our employees unique opportunities to harness the power of technology and engage in a three -month philanthropic project to improve the livelihood of communities in need. In Fall 2023, this partnership allowed C...
Apr 24, 2024
Learn about maskless electron beam lithography and see how Multibeam's industry-first e-beam semiconductor lithography system leverages Synopsys software.The post Synopsys and Multibeam Accelerate Innovation with First Production-Ready E-Beam Lithography System appeared fir...
Apr 18, 2024
Are you ready for a revolution in robotic technology (as opposed to a robotic revolution, of course)?...

featured video

MaxLinear Integrates Analog & Digital Design in One Chip with Cadence 3D Solvers

Sponsored by Cadence Design Systems

MaxLinear has the unique capability of integrating analog and digital design on the same chip. Because of this, the team developed some interesting technology in the communication space. In the optical infrastructure domain, they created the first fully integrated 5nm CMOS PAM4 DSP. All their products solve critical communication and high-frequency analysis challenges.

Learn more about how MaxLinear is using Cadence’s Clarity 3D Solver and EMX Planar 3D Solver in their design process.

featured paper

Designing Robust 5G Power Amplifiers for the Real World

Sponsored by Keysight

Simulating 5G power amplifier (PA) designs at the component and system levels with authentic modulation and high-fidelity behavioral models increases predictability, lowers risk, and shrinks schedules. Simulation software enables multi-technology layout and multi-domain analysis, evaluating the impacts of 5G PA design choices while delivering accurate results in a single virtual workspace. This application note delves into how authentic modulation enhances predictability and performance in 5G millimeter-wave systems.

Download now to revolutionize your design process.

featured chalk talk

Silence of the Amps: µModule Regulators
In this episode of Chalk Talk, Amelia Dalton and Younes Salami from Analog Devices explore the benefits of Analog Devices’ silent switcher technology. They also examine the pros and cons of switch mode power supplies and how you can utilize silent switcher µModule regulators in your next design.
Dec 13, 2023
18,478 views