prpl @ Embedded World 2018


Last month, prpl attended Embedded World at the Nuremberg Exhibition Centre, Germany. From February 27th – March 1st  2018 the focus was on all things embedded systems, with members of the embedded community coming together from all over the world.

Embedded World is definitely becoming the leading event throughout the world for all things embedded.

There was a definite emphasis on Artificial Intelligence this year, from voice recognition to financial applications, to mapping tools. What’s new is the realisation that AI can definitely take advantage of both cloud and end point. In the past, AI was definitely relegated to the context of the cloud.

Now, given the exploding power of silicon, more and more parts of the AI application can be moved to where the data matters – the end point. For example in a car, making the important decisions if it has a self-driving application. These decisions are processed in real time with low latency. There is the expectation in terms of connectivity that all the AI functionality, data models, training algorithms and everything else is reliable.


The Growing Adoption of the Open Source Model Across Technology

Open source is nothing new. It’s been around for many many years; both on the consumer side and in industry. What’s interesting now is to see open source also applied to hardware related software stacks. I’ve seen great progress on the Linux Foundation sponsored project Zephyr, and seeing the involvement of Linaro, which from the commercial side is a very powerful entity. This combination is definitely going to produce some very interesting results!

We’re also seeing many other vendors proposing open source packs for connected devices, AI and embedded in general. What’s really interesting to observe, are the benefits that the model of open source brings to vendors in terms of control of the technology strategy itself. Open source in a business to business context is not about saving money, there are still costs in developing it. In the end it’s not a financial decision, it’s about controlling the platform so that the product can better fit the specific requirements set out.

Moving to hardware, we were really intrigued by the ten presentations we saw during the RISC-V track at the event. What’s really impressive is the variety of the ecosystem that is developing around this new iteration of the open source processor, developed by the Berkley EECS department. It’s called RISC-V because this is the fifth iteration. It’s the first time we’ve actually seen such a broad ecosystem developing around this technology. With everything from silicon vendor, tools, IP, simulation, security; all the building blocks are coming together. It’s very interesting to see both large players, as well as small, dynamic and innovative startups.

The other interesting aspect of RISC-V was the real driver behind adoption of open source hardware. A number of presentations at Embedded World actually showed that the one-size-fits-all model cannot really extract the best out of existing technology. Sometimes, the things we can buy from the shelf aren’t exactly tailored to optimise what we want to do. The example of extreme low power applications for energy harvesting devices is really interesting. In this case by relying on open source, researchers were actually able to develop components that were able to run at 90% power. This is compared to the same processor that would result from a traditional commercial license.

This is the true benefit of open source hardware – extreme customisation and optimisation to really deliver the most that technology can do these days.
The time is now for open source hardware!  
Open source hardware is extremely important in 2018, because the evolution in terms of silicon technology is about to reach the limits imposed by the physics of silicon. Therefore it’s important to take the best out of the technology that we are getting; and the extreme optimisation in terms of low-power, high-performance specialised custom hardware is possible only through open source.

Is Linux really coming to Embedded?

The other common theme that I’ve seen at Embedded World is Linux. Linux for the most part is delegated to data centre applications, computing applications, phones and so forth. Is it now coming to embedded?

We’d like to highlight the example of the high level of interest that we had in our OpenWrt 101 class. OpenWrt is a great example of community driven technology. The industry sees the commercial value and here’s where the community and industry come together. It was very revealing to see the role that a non-profit organisation such as prpl Foundation can play in matching the diverging requirements between industry and open source communities.

Prpl Foundation is an open-source, community-driven, collaborative, non-profit foundation with a focus on enabling next-generation datacenter to device portable software and virtualized architectures.

Highly optimised Linux systems are very open to third parties packaging and are definitely becoming more mainstream. In the room during the class, we saw the direct interest of one of the top three network device vendors in the world. Here, they were explaining how they are putting this in production. At the same time, the number one vendor of smart lighting solutions was looking into embedded linux and openwrt to provide smart ceilings, a very interesting proposition!


Every year there’s a growing interest in the subject of security. We see more and more talks, more conversations and more products. The industry seems to realise that if it is not secure, it doesn’t work. This is true of software, communication protocols and applications, but finally we see this now on hardware. With this in mind, more companies are providing solutions and products to secure the hardware itself. This is so important because the lower we go in the technology stack, the more resilient the protection is. This isn’t to say that we only need hardware security, we need all security layers! What multilayer security has been missing so far was the actual hardware security.
We are seeing some very interesting tech developments so far, especially from startups. Something that’s intriguing is the idea of keeping track of all the metadata which, present in high level programming languages such as C or Java, traditionally gets lost in the compilation process. Now we are looking at keeping some of this metadata to offer to the hardware itself so that it can get a sense of the security context of the application when it executes every single instruction.


It looks like 2018 at Embedded World was really the year of Hypervisors. In past editions, hypervisors were mentioned in presentations and by vendors more as an interesting new alternative to traditional ways of creating security with separations within systems. This year was more about showing real world applications. There are so many! They tend to be really mission critical applications from bionics to transportation to defence. Hypervisors are here to stay.

At the same time however, something presenters and exhibitors pointed out is that hypervisors are not all created equally. This isn’t to say that some are better than others, but rather about understanding all the differences and what fits better in specific use cases. For example, some hypervisors tend to be extremely thin, which is not only good for the system footprint and overhead but also for security. The smaller the piece of software, the smaller the attack surface.

Small is good, but can’t provide the richness of functionality an application might require, especially if they want to run rich operating systems such as Linux. This an interesting trade-off that needs to be made based on a specific application, where a vendor offers an extremely thin but minimal functionality type of hypervisor and another provides something a little richer in functionality but definitely has a larger overhead in the system as a whole.

What was also very interesting was that for the first time, we saw shared data about performance of benchmarking hypervisors on embedded systems. In particular we liked this comparison of an extremely thin hypervisor (for example the prpl open source hypervisor) and a well established commercial product (like Seltech FOXvisor) which has richer functionality and was benchmarked in microtests that would actually run linux. Obviously numbers in terms of performance were different, but at the same time the breadth of application was covered.

PUF – Physically Unclonable Functions

This year looks like the year where PUF becomes a commercial reality. In previous editions, we presented some of the most promising attempts at this technology – some of which are included in the prplSecurity framework, and in particular the prpl PUF API. In the past we showed proofs of concept and this year I gave a presentation with the world industry leader in commercial applications of SRAM PUF, which is prpl member Intrinsic ID.

We took the time to go through specific industry use cases as well as real world use case examples. In particular we showed how SRAM PUF technology can help secure IP within the processor itself and how this is delivered in the firmware. In this case, it’s encrypted but with a key which is specific to the device. This is about overproduction, grey market and all the issues that embedded systems vendors know well, and is a way to protect the firmware itself from unwanted duplication and clones.

Another very interesting use case that of an actual secure device connecting to the cloud. We looked at the example of AWS and how the  SRAM PUF technology can in fact create a unique identifier for each device and automatically generate a crypto pair and a certificate.
The presentation showed how this can now be done with ECC which is the best you can aim for in an embedded low power constrained device because it provides the same level of security with a much lower energy requirement and processing requirement.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s