Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:42 PM
Connect Directly

Why A Hardware Root Of Trust Matters For Mobile

Even with mobile device management, enterprises still lack control over devices

As the IT industry grapples with the security implications of mobile devices, some experts believe one of the most important first steps it can take is to stop getting caught up in irrelevancies.

"We are lost in a conversation of mobile versus PC or phones versus tablets or whatever else, but that's not what's important," says Steven Sprague, CEO of Wave Systems, explaining that the really important piece is, "How are we going to manage multiple tenant trusted devices, and what are the basic foundation principles for that? Then you've got to stick to your guns. I don't care if they have the slickest marketing program under the sun -- we've got to continue putting on our glasses and calling out when the emperor has no clothes."

And one of the most important duds that mobile is missing, according to Sprague, is a standards-based hardware root of trust. Together with Dave Challener, security architect for Johns Hopkins University Applied Physics Laboratory, and Dan Griffin, president of JW Secure, Sprague discussed the deficiencies of mobile device technology in a panel earlier this month at the first annual Trusted Computing Conference in Orlando, Fla. The running theme in their discussion was the enterprise relinquishment of on-device control.

"Mobile is a step backward from a couple of perspectives," says Griffin, explaining that, first and foremost, the major mobile device vendors have not baked enough security features into their operating systems or provided the kind of development platforms that encourage developers to build security into their applications.

"Finally, the carriers and the implementers of these operating systems are super-nervous about providing system-level access to the device, but you can't do antivirus or other security without system-level access," he says. "So we're just in this weird state right now where, OK, we have all this fun stuff we could do to make a PC really locked down -- you just can't do that on a mobile device."

Challener views the state of things even more dimly.

"You look at mobile devices, and you see that you don't control the network, you don't control the hardware, you can't select hardware subsystems that are in it, you don't get to control when firmware is updated, you don't get to select the OS, and the app selection in an app store is uncontrolled," he says. "Boy, if I were an IT guy, I would be panicking."

However, mobile has done one very good thing for IT security: bringing the discussion squarely back around to the importance of device security.

"A device-centric view of the network is really useful," Sprague says. "The enterprise has been trying to ignore the device because devices are complicated and messy. And so we have control in the network, and hope and prayer in the device."

But control is the key word in device security; as things stand, there's no real control on the mobile device, whether it is owned by the employee or the enterprise. Take MDM, for example.

"You don't buy mobile device control software -- you buy mobile device management software," he says.

One of the biggest impediments today is the fact that at the hardware level, the device is either controlled by the carrier or the vendor itself. This is most visibly seen in the transition from iPhone to iPad as Apple got out of its single-carrier relationship with AT&T.

"As a carrier, AT&T controlled the iPhone with absolute power. They could shut it off at will, terminate service, and change the OS," Sprague says. "The brilliant maneuver by Apple was to take control of the initial hardware root of identity of the subscriber."

Nowadays, the only way to get full use out of the iPad is through that connection with iTunes, with Apple having ultimate control over the device and the ability to shut down its functionality remotely.

"The reason why a standards-based, independent hardware root of trust is important is that it allows someone else to take control of the device before the carrier," he says. "If you look at almost every use case and application out there, this is the fundamental capability that's being requested, even if it is being requested in a language that is not as clear as that."

Unfortunately, the real difficulty is convincing carriers or vendors to loosen their grasp of control. It is an issue of leverage and one that Sprague believes only one entity exists capable of wresting control away for the betterment of the industry.

"The only way we can wrestle control back from Verizon is through a requirement placed on the environment by a player strong enough to do that," he says. "The only player -- emphasis on the word 'only' -- is the U.S. federal space."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-02-21
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
PUBLISHED: 2020-02-21
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
PUBLISHED: 2020-02-21
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent hea...
PUBLISHED: 2020-02-20
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produc...
PUBLISHED: 2020-02-20
The Trend Micro Security 2019 ( and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the ...