Hardware - A Double-Edged Sword for Security
Offered By: USENIX Enigma Conference via YouTube
Course Description
Overview
Syllabus
Tortuga Logic
Hardware Essential to Consider in the context of Security
Hardware as a Trust Anchor
Security Analysis Must Consider Entire System • Vulnerabilities hide in design complexity and interactions between different system components
Example: Flawed Root of Trust Design
Hardware is Highly Configurable
Example: Default Hardware Configuration is Insecure
Example: Secure Debug Configuration Inconvenient
Security Requires Alignment Across Many Stakeholders
Example: Dynamic Voltage and Frequency Scaling
Example: Speculative and Out-of-Order Execution
Industry-Wide Hardware Security Initiatives . Challenge: Security requires alignment between stakeholders in the hardware ecosystem which span multiple companies and countries
Hardware Security Development Lifecycle (HSDL)
Hardware Information Flow Analysis (IFA) • Challenge: Security specification and verification requires time and resources . Using tools where information flow is a first-class concept streamlines both the specification and verification of confidentiality and integrity requirements
Requirements for Secure Hardware
Hardware is a Double-Edged Sword We All Wield Together • IP Providers and SoC Vendors
Taught by
USENIX Enigma Conference
Related Courses
Between Physical and Sofware: Fault Attacks, Side Channels, and MitigationsGraz University of Technology via edX POSWorld - Should You Be Afraid of Hands-On Payment Devices
Black Hat via YouTube Drammer - The Making Of
Hack In The Box Security Conference via YouTube The Evolving Attack Surface
Kaspersky via YouTube Blacksmith- Compromising Target Row Refresh by Rowhammering in the Frequency Domain
IEEE via YouTube