Transcript
Page 1: Hardware Support for Trustworthy Systems

Hardware Support for Trustworthy Systems

Ted HuffmireACACES 2012Fiuggi, Italy

Page 2: Hardware Support for Trustworthy Systems

Disclaimer

• The views presented in this course are those of the speaker and do not necessarily reflect the views of the United States Department of Defense.

Page 3: Hardware Support for Trustworthy Systems

About Me

• Assistant Professor of CS at NPS• Research

– Computer Architecture, Computer Security– Fast and Secure– Hardware-Oriented Security

Page 4: Hardware Support for Trustworthy Systems

Course Overview

• Lecture 1: Overview: Hardware-Oriented Security and Security Engineering

• Lecture 2: Reconfigurable Security Primitives• Lecture 3: Apply Primitives to Memory

Protection, Design Example• Lecture 4: Forward-Looking Problems

Page 5: Hardware Support for Trustworthy Systems

Lecture 1 Overview

• Hardware-Oriented Security• Security Engineering

Page 6: Hardware Support for Trustworthy Systems

Hardware-Oriented Security

• Hardware-Oriented Security• Security Engineering

Page 7: Hardware Support for Trustworthy Systems

What is Hardware Security?

• Many of the issues of hardware security are similar to traditional computer security

• Anything can be hacked, but the attacker has finite resources.

• Each security technique has tradeoffs.

Page 8: Hardware Support for Trustworthy Systems

What is Hardware Security?

• Foundry Trust• Intellectual Property• Operational Attacks• Developmental Attacks• System Assurance

Page 9: Hardware Support for Trustworthy Systems

What is Hardware Security?

• Interfaces• Composition• Metrics• Education

Page 10: Hardware Support for Trustworthy Systems

Problems

• Global Supply Chain of Integrated Circuits• System Assurance

Page 11: Hardware Support for Trustworthy Systems

Confronting Security at the Hardware Level

• Opportunities of the hardware level• Challenges of the hardware level

Page 12: Hardware Support for Trustworthy Systems

A Brief Word About ‘Cyber’

• Beware of propaganda• Think critically

Page 13: Hardware Support for Trustworthy Systems

Security Engineering

• Hardware-Oriented Security• Security Engineering

Page 14: Hardware Support for Trustworthy Systems

Security Engineering

• Defending against skilled attackers is hard• Holistic view of entire system• Use the scientific method• Every security technique has tradeoffs

Page 15: Hardware Support for Trustworthy Systems

Security Engineering

• Assume the enemy will be in your networks• Increase the risk and cost for the adversary

Page 16: Hardware Support for Trustworthy Systems

Security Engineering

• Do not rely on security through obscurity• Principle of least privilege• Minimize system complexity

Page 17: Hardware Support for Trustworthy Systems

Security Engineering

• Reference monitor concept• Separation (of duties and system components)

Page 18: Hardware Support for Trustworthy Systems

Security Engineering

• Penetrate & patch vs. inherently trustworthy• Platform diversity• Checklists and hardening guides

Page 19: Hardware Support for Trustworthy Systems

Security Engineering

• Study past success• Secure defaults• Backups, recovery, and rollback

Page 20: Hardware Support for Trustworthy Systems

Security Engineering

• Important Considerations• Approaches to Security Engineering

Page 21: Hardware Support for Trustworthy Systems

Rigorous Design Practices

• Configuration management of tools/IP• Eliminate support for insecure legacy

technology• Default configuration disables unnecessary

services

Page 22: Hardware Support for Trustworthy Systems

Rigorous Design Practices

• Only develop the features needed• Debugging messages not in production code• Error messages that don’t reveal information

Page 23: Hardware Support for Trustworthy Systems

Rigorous Design Practices

• Secure coding practices• Use of formal security analysis and evaluation• Covert channel analysis• Side channel analysis

Page 24: Hardware Support for Trustworthy Systems

Rigorous Design Practices

• Protocol analysis• Robust protocols and authentication schemes• Is the implementation faithful to the spec?• Manage complexity. Reference monitor

concept.

Page 25: Hardware Support for Trustworthy Systems

Self-protection

• Do not expose critical security functions to attack from other circuitry.

• Examples

Page 26: Hardware Support for Trustworthy Systems

Layered Dependencies

• Security-critical circuitry must not depend on circuitry of lesser trustworthiness

• In trusted software stack, applications depend on OS libraries, which depend on secure kernel

Page 27: Hardware Support for Trustworthy Systems

Lecture 1 Reading

• Secure Design– Reflections on Trusting Trust

• http://dl.acm.org/citation.cfm?id=358210– The Protection of Information in Computer Systems

• http://www.acsac.org/secshelf/papers/protection_information.pdf

– Design Principles for Security (NPS Technical Report)• http://www.cisr.us/downloads/techpubs/

nps_cs_05_010.pdf

Page 28: Hardware Support for Trustworthy Systems

Lecture 1 Reading

• Secure Design– Design and verification of secure systems

• http://dl.acm.org/citation.cfm?id=806586– Shared Resource Matrix Methodology: An

Approach to Identifying Storage and Timing Channels

• http://dl.acm.org/citation.cfm?id=357374– On the Buzzword ‘Security Policy’

• http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=130789

Page 29: Hardware Support for Trustworthy Systems

Lecture 1 Reading

• Hardware-Oriented Security and Trust– Trustworthy Hardware: Identifying and Classifying

Hardware Trojans• http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5604161

– Security Engineering• http://www.cl.cam.ac.uk/~rja14/book.html

– Micro-Architectural Cryptanalysis• http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4288047

– Physical Unclonable Functions for Device Authentication and Secret Key Generation

• http://dl.acm.org/citation.cfm?id=1278484

Page 30: Hardware Support for Trustworthy Systems

Lecture 1 Reading

• Physical Attacks– Temperature Attacks

• http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4812164

– Information Leakage from Optical Emanations• http://dl.acm.org/citation.cfm?id=545189

– Differential Power Analysis• http://www.springerlink.com/content/kx35ub53vtrkh2nx/

– Keyboard Acoustic Emanations• http://ieeexplore.ieee.org/xpls/abs_all.jsp?

arnumber=1301311

Page 31: Hardware Support for Trustworthy Systems

Lecture 1 Reading

• trust-HUB.org– http://trust-hub.org/

• Introduction to Hardware Security and Trust– http://springer.com/978-1-4419-8079-3

• Towards Hardware-Intrinsic Security– http://springer.com/978-3-642-14451-6


Recommended