Trusted products and services for embedded security. Join-us on Linkedin

ProvenVPN

Secure VPN for trusted communications

The need for Virtual Private Network (VPN)

Applications running on connected embedded devices need to communicate securely with remote peers (other embedded devices, gateways or servers): they must be assured that their communications cannot be listened to or tampered with on the way. Even on “private” networks it is never clear exactly who could be listening.

Providing this level of security requires experience with cryptography and protocol design, in order to achieve strong authentication between connected peer, and a robust messages encryption to maintain their integrity and confidentiality.

Limitations of Traditional VPN Implementations

Traditional VPN clients cannot be fully trusted because they run in the same address space as the underlying Rich OS (Android, Linux, etc.).  They are therefore vulnerable to the large number of local and remote attacks that affect traditional Rich OSs. These attacks can have a direct impact on:

Confidentiality and Authenticity

If an attacker can use a local application to remotely inject a new certificate in the certificate storage to perform a Man-In-The-Middle attack, or read the private certificate to impersonate the device, the confidentiality or authenticity of exchanged messages is not guaranteed, therefore the communication cannot be really trusted.

Availability

If an attacker can use a local application to erase the certificates store of the VPN client, it will prevent the device from either authenticating remote servers or from being authenticated by the remote server, leading to availability issues. This means that compromised devices cannot be recovered or controlled remotely.

Furthermore, such attacks can be used as stepping stones for further, more sophisticated attacks.

Why ProvenVPN

ProvenVPN is a secure software application that benefit from ProvenRun’s years of expertise in developing security applications for embedded systems. Its architecture relies on the use of a secure OS, to provide a secure execution environment that is protected from attacks that could be performed from the Rich OS, to guarantee the authenticity, confidentiality and availability of the VPN certificates.

Features:

  • Secure boot
  • Secure OS protection
  • Secure certificate management
  • Cryptographic operations

Benefits:

  • No OS modifications
  • Fit the requirements and architectures of most deployment
  • Protect and isolates critical assets
  • Leverages on Hardware Root of Trust
  • High security assurance level

Supported Hardware:

ProvenVPN is available on selected ARM Cortex-A microprocessor leveraging on the TrustZone hardware isolation.

Please contact us for more details.

Challenge coverage

Security-by-design

Security-by-design

Security needs to be integrated at the design stage (security-by-design) and embedded in the most effective way wherever it is required in the technical infrastructure. There are many ways to embed security in systems and devices and the selected solution will be the result of a trade-off between cost, security level and performance.

More info
Trusted Computing Base

Trusted Computing Base

Security engineers define the Trusted Computing Base (TCB) as the set of hardware, firmware and software components that are critical to the security of a system. In order to limit the risk of vulnerabilities, the TCB need to be well identified, as small as possible and made-up of components that can be really trusted.

More info

Other Secure Applications