4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
©TheMcGraw-Hill Companies, Inc. Permission required for reproduction or display. COMPSCI 125 Introduction to Computer Science I.
Basic Computer Organization CH-4 Richard Gomez 6/14/01 Computer Science Quote: John Von Neumann If people do not believe that mathematics is simple, it.
GCSE Computing#BristolMet Session Objectives# Must identify some common types of computer system Should describe the meaning of a computer system Could.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Microcontroller: Introduction
Lesson Objectives By the end of this lesson you will be able to:
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Protecting Data on Smartphones and Tablets from Memory Attacks
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Computer Organization - 1. INPUT PROCESS OUTPUT List different input devices Compare the use of voice recognition as opposed to the entry of data via.
1 Course Title: IT IN BUSINESS Course Instructor: ADEEL ANJUM Chapter No: 04 1 BY ADEEL ANJUM (MCS, CCNA,WEB DEVELOPER)
Computer Structure & Architecture 7b - CPU & Buses.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
PARTS OF A COMPUTER 2 Hardware Computer Hardware is any of the physical parts of the computer you can touch. There are 4 categories: 1. Input Devices.
Computer Systems The Kingsway School. What are Computer Systems? Computer systems process data electronically Data is information which has no meaning.
Introduction To Computers
Hardware and Software By: Kyle Face. Hardware! Main computer hardware components Hardware refers to the physical components of a computer (What you can.
Chapter I: Introduction to Computer Science. Computer: is a machine that accepts input data, processes the data and creates output data. This is a specific-purpose.
Introduction to networking (Yarnfield) Configure a router.
COMPUTER HARDWARE & SOFTWARE INTRODUCTION TO LIBRARY & INFORMATION SCIENCES (5501) WORKSHOP SPRING 2013 By: Huma Malik Librarian, Preston University, Islamabad.
INTRODUCTION TO COMPUTERS. A computer system is an electronic device used to input data, process data, store data for later use and produce output in.
Identify internal hardware devices (e. g
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Computer Systems Nat 4/5 Computing Science Computer Structure:
CPU Lesson 2.
Hardware-rooted Trust for Secure Key Management & Transient Trust
Introduction.
Overview of Computers and Programming Chapter 1
Computer Software.
Components of Computer
New Cache Designs for Thwarting Cache-based Side Channel Attacks
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
ABYSS : An Architecture for Software Protection
Chapter 7.2 Computer Architecture
TOPIC 6: SYSTEM START-UP AND CONFIGURATION
Technology Literacy Hardware.
How SCADA Systems Work?.
UNIT 19 Data Security 2.
Introduction of microprocessor
introduction to computer
Course Name: Computer Application Topic: Central Processing Unit (CPU)
Introduction to Computing
Applying Digital Watermarking Technology to Control CD copying
Computer Parts There are many parts that work together to make a computer work.
RANDOM FILL CACHE ARCHITECTURE
Essential Introduction to Computers
Enhancing Web Application Security with Secure Hardware Tokens
Keyboarding Class LHMS Ms. Key © Mr. Thrasher
Authority-mode Secret Protection (SP) architecture
Bastion secure processor architecture
Introduction to Computing
AEGIS: Secure Processor for Certified Execution
Computer Hardware Prepared by:- Mr. Pawan Kumar
Protect Your Hardware from Hacking and Theft
User-mode Secret Protection (SP) architecture
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
GCSE OCR 3 Memory Computer Science J276 Unit 1
Chapter 1 Introduction.
Introduction to computers
A451: Computer Systems and Programming
INTRODUCTION TO COMPUTERS
Physical Unclonable Functions and Applications
Aimee Coughlin, Greg Cusack, Jack Wampler, Eric Keller, Eric Wustrow
Cloud Storage-as-a-Service and Course Reflection
Overview of Computer system
Presentation transcript:

4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol Architecture for Non-Copyable Disk (NCdisk) Using a Secret-Protection (SP) SoC Solution Michael S. Wang and Ruby B. Lee Department of Electrical Engineering, Princeton University 1. Introduction Problem of study: Digital contents piracy Research: Examined both software and hardware vulnerabilities in existing copy-protection methods. Proposal: Proposed a non-copyable disk (NCdisk) that makes it significantly harder for digital contents to be copied. Any digital content written onto the NCdisk can only be read through a predefined set of NCdisk outputs. 4. NCdisk SP-based SoC Architecture The NCdisk concept ultimately boils down to achieving two goals. The first goal is to protect secret keys inside the NCdisk. The second goal is to protect data output such that the original digital plaintext data is never leaked out. We achieve these two goals by implementing a SoC consisting of existing disk controller components, plus a minimal set of additions. This new SoC can then be connected to the rest of the existing disk components to turn an existing disk into an NCdisk. 5. NCdisk Security Protocol We present a security protocol to use along with the NCdisk for an online movie download application. Manufacturer sends a blank NCdisk to Content Provider (CP), who initializes the NCdisk. NCdisk Architecture Existing Hard Disk Architecture 2. Threat Model Content provider’s software is trusted and is allowed to use the critical secrets but cannot leak these secrets out. Any other software is un-trusted and is not allowed to use the secrets. The attacker is able to mount software attacks. Probing inside a System-on-Chip (SOC) is more difficult without destroying functionality, so it is not in our threat model. We also do not consider side-channel attacks. User buys an NCdisk from store and then connects to CP through Internet. SP Instructions for the NCdisk Processor SP Instruction Description Begin_TSM (on-chip ROM ) Begins execution of TSM (enables access of TSM scratchpad memory) End_TSM (on or off-chip) ends execution of TSM (disables access of TSM scratchpad memory) SecureMem_Set (on or off-chip) Sets StartAddr & EndAddr registers to define TSM scratchpad memory DeviceKey_Read (on or off-chip) Load the Device Key to be used by TSM SW 3. NCdisk Concept The NCdisk is a data storage device, in which any digital content written into the device is automatically encrypted using a key that is generated by the NCdisk that never leaves the NCdisk. All data stored on the NCdisk are encrypted. It can only be read through a set of predefined outputs, such that the digital plaintext form of the data never leaves the NCdisk. CP prepares a movie for the NCdisk NCdisk APIs for Applications API Functions Description TSM_Write Write data into NCdisk TSM_Read_Analog Output to analog channel TSM_Read_Trusted Output to trusted display TSM_Read_Integrated Output to internal display NCdisk stores the downloaded movie Reference Michael Wang and Ruby Lee, “Architecture of Non-Copyable Disk (NCdisk) Using Secret-Protection (SP) SoC Solution”, Forty-First Asilomar Conference on Signals, Systems and Computers, November 4-7, 2007. Jeffrey S Dwoskin, Ruby B. Lee, "Hardware-rooted Trust for Secure Key Management and Transient Trust", ACM Conference on Computer and Communications Security, pp. 389-400, October 2007. Jeffrey Dwoskin, Dahai Xu, Jianwei Huang, Mung Chiang, Ruby Lee, "Secure Key Management Architecture Against Sensor-node Fabrication Attacks", IEEE GlobeCom 2007, November 2007.