{"id":375473,"date":"2017-03-30T22:48:14","date_gmt":"2017-03-31T05:48:14","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&#038;p=375473"},"modified":"2025-01-08T05:48:53","modified_gmt":"2025-01-08T13:48:53","slug":"sopris","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/sopris\/","title":{"rendered":"Project Sopris"},"content":{"rendered":"<h2 style=\"text-align: left; color: #4a728d;\">The Seven Properties of Highly Secure Devices<\/h2>\n<p>The next decade promises the democratization of connectivity to every device. Significant drops in the cost of connectivity mean that every form of electrical device\u2014every child\u2019s toy, every household\u2019s appliances, and every industry\u2019s equipment\u2014will become connected to the Internet. Tens of billions of these devices are controlled by microcontrollers, a class of device particularly ill-prepared for the security challenges of internet connectivity.<\/p>\n<p>The Project Sopris research team is exploring the goal of securing the vast number of low cost internet connected devices coming online. Our first Technical Report \u201cThe Seven Properties of Highly Secure Devices\u201d is published here outlining our research, including the following:<\/p>\n<ul>\n<li>seven properties we assert are required in all highly secure devices<\/li>\n<li>our experiments towards designing microcontroller based prototype devices that are highly secure and exhibit these properties<\/li>\n<\/ul>\n<p>As part of this research work, we have tested different approaches to device security from silicon to software and hypothesize that optimal device security must be rooted in hardware but kept up-to-date through evolving software. <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/seven-properties-highly-secure-devices\/\" target=\"new\" rel=\"noopener noreferrer\">Read our first technical report<\/a> to learn more.<\/p>\n<p>The Sopris Team invites the security research community to engage with us and validate our latest experiment, the Sopris board, by <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/hackerone.com\/project-sopris\" target=\"_blank\" rel=\"noopener noreferrer\">applying to participate in the Project Sopris Challenge<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center; color: #4a728d;\">Project Sopris Security Challenge<\/h3>\n<p style=\"text-align: center; color: #4a728d;\"><i>Thanks to all the skilled hackers who participated!<\/i><\/p>\n<p style=\"text-align: center; color: #4a728d;\">Over 150 hackers pounding on their Project Sopris boards for 60 days. Microsoft Research<br \/>\nSopris Challenge completes as a great learning experience with no verified exploits.<\/p>\n<p style=\"text-align: center; color: #4a728d;\">Stay tuned for updates from the Project Sopris team as we continue to work with<br \/>\nthe security community to explore devices secured from the silicon up.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Project Sopris research team is exploring the goal of securing the vast number of low cost internet connected devices coming online. We have tested different approaches to device security from silicon to software and hypothesize that optimal device security must be rooted in hardware but kept up-to-date through evolving software.<\/p>\n","protected":false},"featured_media":375587,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-375473","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"2017-03-31","related-publications":[375554,704164],"related-downloads":[],"related-videos":[504959],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Galen Hunt","user_id":31846,"people_section":"Group 1","alias":"galenh"},{"type":"guest","display_name":"George Letey","user_id":372200,"people_section":"Group 1","alias":""}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/375473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":15,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/375473\/revisions"}],"predecessor-version":[{"id":1116156,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/375473\/revisions\/1116156"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/375587"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=375473"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=375473"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=375473"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=375473"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=375473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}