Hardware Tamper Resistance - Why and How
Offered By: YouTube
Course Description
Overview
Explore hardware tamper resistance techniques and principles in this conference talk from DerbyCon 4. Delve into various types of anti-tamper methods, including physical and electronic systems, and understand the critical principles behind them. Learn about the evolution of smartcards, FIPS, and HSMs, and discover why electronics require anti-tamper protection. Examine new approaches like machine-verifiable seals and remote verification for servers. Investigate trusted computing technologies, virtualization-based security, and secure multiparty systems. Gain insights into general design principles for tamper-resistant hardware and explore options for implementing high-end and low-end HSMs, remote keys, and layered systems. Understand the implications for projects like PirateBay, CloudFlare, and open-source initiatives in the context of hardware security.
Syllabus
Intro
Me
What is tampering?
Types of Anti-Tamper
Critical principle
Physical Systems
Physical vs. Electronic
Why do electronics need anti-tamper?
Smartcards
FIPS and HSMS
What changed?
Users are lazy
31c3/RSA work with Eric Michaud
New way: Machine-verifiable seals
Remote verifiable seals
So, servers?
IANA/ICANN HSM
In-between systems
Trusted Computing Group • Intel TXT, AMD SVM (+ ARM TrustZone, MTM) • Derived from DRM efforts ("Palladiurn") in 1990s
Intel SGX
Virtualization-based
Secure multiparty
Raspberry Pi in a Box
Crypto Stick
SmartCard-HSM
General design principles
So, three options
Cheap high-end HSMS
Cheap low-end HSMS
Remote keys
Layered systems
PirateBay
CloudFlare
Open-source
Related Courses
Hardware SecurityUniversity of Maryland, College Park via Coursera Information Security- II
Indian Institute of Technology Madras via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam Cybersecurity
University of Maryland, College Park via Coursera Learning Mobile Device Security
LinkedIn Learning