Hardware - A Double-Edged Sword for Security
Offered By: USENIX Enigma Conference via YouTube
Course Description
Overview
Syllabus
Tortuga Logic
Hardware Essential to Consider in the context of Security
Hardware as a Trust Anchor
Security Analysis Must Consider Entire System • Vulnerabilities hide in design complexity and interactions between different system components
Example: Flawed Root of Trust Design
Hardware is Highly Configurable
Example: Default Hardware Configuration is Insecure
Example: Secure Debug Configuration Inconvenient
Security Requires Alignment Across Many Stakeholders
Example: Dynamic Voltage and Frequency Scaling
Example: Speculative and Out-of-Order Execution
Industry-Wide Hardware Security Initiatives . Challenge: Security requires alignment between stakeholders in the hardware ecosystem which span multiple companies and countries
Hardware Security Development Lifecycle (HSDL)
Hardware Information Flow Analysis (IFA) • Challenge: Security specification and verification requires time and resources . Using tools where information flow is a first-class concept streamlines both the specification and verification of confidentiality and integrity requirements
Requirements for Secure Hardware
Hardware is a Double-Edged Sword We All Wield Together • IP Providers and SoC Vendors
Taught by
USENIX Enigma Conference
Related Courses
Adventures in Authentication and AuthorizationUSENIX Enigma Conference via YouTube Navigating the Sandbox Buffet
USENIX Enigma Conference via YouTube Meaningful Hardware Privacy for a Smart and Augmented Future
USENIX Enigma Conference via YouTube Working on the Frontlines - Privacy and Security with Vulnerable Populations
USENIX Enigma Conference via YouTube Myths and Lies in InfoSec
USENIX Enigma Conference via YouTube