Novel Methods of Augmenting High Performance Processors with Security Hardware Jonathan Valamehr PhD Defense, UC Santa Barbara May 7, 2013 Committee: Prof.

Slides:



Advertisements
Similar presentations
Supporting Security at the Gate Level: Opportunities and Misconceptions Tim Sherwood UC Santa Barbara.
Advertisements

Computer Architecture
1 Complete Information Flow Tracking from the Gates Up Tiwari, Wassel, Mazloom, Mysore, Chong, Sherwood, UCSB, ASPLOS 2009 Shimin Chen LBA Reading Group.
Subthreshold SRAM Designs for Cryptography Security Computations Adnan Gutub The Second International Conference on Software Engineering and Computer Systems.
Hardware/Software Mechanisms for Cross-Layer Power Proportionality “Power Prop” Alex Yakovlev, Andrey Mokhov, Sascha Romanovsky, Max Rykunov, Alexei Iliasov.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Department of Computer Science iGPU: Exception Support and Speculative Execution on GPUs Jaikrishnan Menon, Marc de Kruijf Karthikeyan Sankaralingam Vertical.
Thoughts on Shared Caches Jeff Odom University of Maryland.
1 Implementing an Untrusted Operating System on Trusted Hardware David Lie Chandramohan A. Thekkath Mark Horowitz University of Toronto, Microsoft Research,
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Tamper Evident Microprocessors Adam Waksman Simha Sethumadhavan Computer Architecture & Security Technologies Lab (CASTL) Department of Computer Science.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.
A reconfigurable system featuring dynamically extensible embedded microprocessor, FPGA, and customizable I/O Borgatti, M. Lertora, F. Foret, B. Cali, L.
Cryptography and Data Security: Long-Term Challenges Burt Kaliski, RSA Security Northeastern University CCIS Mini Symposium on Information Security November.
Thread-Level Transactional Memory Decoupling Interface and Implementation UW Computer Architecture Affiliates Conference Kevin Moore October 21, 2004.
Architecture Support for Security Peter Chapman Michael Maass.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Addressing Supply Chain Security with Split Manufacturing Ted Huffmire Summer UCI CECS Seminar July 27, 2012.
3Dsec: Trustworthy System Security through 3-D Integrated Hardware Ted Huffmire 14 January 2009.
Embedded Software Optimization for MP3 Decoder Implemented on RISC Core Yingbiao Yao, Qingdong Yao, Peng Liu, Zhibin Xiao Zhejiang University Information.
Addressing the System-on-a-Chip Interconnect Woes Through Communication-Based Design N. Vinay Krishnan EE249 Class Presentation.
Architectural Considerations for CPU and Network Interface Integration C. D. Cranor; R. Gopalakrishnan; P. Z. Onufryk IEEE Micro Volume: 201, Jan.-Feb.
Active Messages: a Mechanism for Integrated Communication and Computation von Eicken et. al. Brian Kazian CS258 Spring 2008.
Spring 07, Jan 25 ELEC 7770: Advanced VLSI Design (Agrawal) 1 ELEC 7770 Advanced VLSI Design Spring 2007 VLSI System DFT Vishwani D. Agrawal James J. Danaher.
Modern trends in computer architecture and semiconductor scaling are leading towards the design of chips with more and more processor cores. Highly concurrent.
Wireless Sensor Network Security Anuj Nagar CS 590.
Computer Organization and Architecture William Stallings 8 th Edition Chapter 1 Introduction.
Introduction to Symmetric Multiprocessors Süha TUNA Bilişim Enstitüsü UHeM Yaz Çalıştayı
Computer System Architectures Computer System Software
Hardware Trust Implications of 3-D Integration Ted Huffmire (NPS), Timothy Levin (NPS), Michael Bilzor (NPS), Cynthia E. Irvine (NPS), Jonathan Valamehr.
Introspective 3D Chips S. Mysore, B. Agrawal, N. Srivastava, S. Lin, K. Banerjee, T. Sherwood (UCSB), ASPLOS 2006 Shimin Chen (LBA Reading Group Presentation)
A 3D Data Transformation Processor Dimitrios Megas, Kleber Pizolato, Timothy Levin, and Ted Huffmire WESS 2012 October 11, 2012.
Emerging Technologies: A CompSci Perspective UC SANTA BARBARA Tim Sherwood.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Computer Maintenance Unit Subtitle: Bus Structures Excerpted from Copyright © Texas Education Agency, All rights reserved.
LOGO BUS SYSTEM Members: Bui Thi Diep Nguyen Thi Ngoc Mai Vu Thi Thuy Class: 1c06.
1 3-General Purpose Processors: Altera Nios II 2 Altera Nios II processor A 32-bit soft core processor from Altera Comes in three cores: Fast, Standard,
Achieving Non-Inclusive Cache Performance with Inclusive Caches Temporal Locality Aware (TLA) Cache Management Policies Aamer Jaleel,
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Architectures for mobile and wireless systems Ese 566 Report 1 Hui Zhang Preethi Karthik.
Paper Review: XiSystem - A Reconfigurable Processor and System
Automated Design of Custom Architecture Tulika Mitra
Novel Methods of Augmenting High Performance Processors with Security Hardware Jonathan Valamehr PhD Proposal, UC Santa Barbara May 10, 2012 Committee:
Threats and Challenges in FPGA Security Ted Huffmire Naval Postgraduate School December 10, 2008.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
1 Towards Optimal Custom Instruction Processors Wayne Luk Kubilay Atasu, Rob Dimond and Oskar Mencer Department of Computing Imperial College London HOT.
Kyushu University Koji Inoue ICECS'061 Supporting A Dynamic Program Signature: An Intrusion Detection Framework for Microprocessors Koji Inoue Department.
PhD Defense Mohit Tiwari University of California, Santa Barbara Design and Verification of Information Flow Secure Systems.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
Title of Selected Paper: IMPRES: Integrated Monitoring for Processor Reliability and Security Authors: Roshan G. Ragel and Sri Parameswaran Presented by:
Implementing Memory Protection Primitives on Reconfigurable Hardware Brett Brotherton Nick Callegari Ted Huffmire.
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan.
© Wen-mei Hwu and S. J. Patel, 2005 ECE 511, University of Illinois Lecture 4: Microarchitecture: Overview and General Trends.
Hardware Trojan (HT) Detection in 3-D IC Wafi Danesh Instructor: Dr. Christopher Allen EECS 713 High-Speed Digital Circuit Design Final Project Presentation.
PC Internal Components Lesson 4.  Intel is perhaps the most recognizable microprocessor manufacturer. List some others.
What is a Microprocessor ? A microprocessor consists of an ALU to perform arithmetic and logic manipulations, registers, and a control unit Its has some.
Simultaneous Information Flow Security and Circuit Redundancy in Boolean Gates Ryan Kastner Department of Computer Science & Engineering.
1 November 11, 2015 A Massively Parallel, Hybrid Dataflow/von Neumann Architecture Yoav Etsion November 11, 2015.
CML Path Selection based Branching for CGRAs ShriHari RajendranRadhika Thesis Committee : Prof. Aviral Shrivastava (Chair) Prof. Jennifer Blain Christen.
Lecture 17: Dynamic Reconfiguration I November 10, 2004 ECE 697F Reconfigurable Computing Lecture 17 Dynamic Reconfiguration I Acknowledgement: Andre DeHon.
VU-Advanced Computer Architecture Lecture 1-Introduction 1 Advanced Computer Architecture CS 704 Advanced Computer Architecture Lecture 1.
Computer Architecture Organization and Architecture
Hardware-rooted Trust for Secure Key Management & Transient Trust
New Cache Designs for Thwarting Cache-based Side Channel Attacks
12.4 Memory Organization in Multiprocessor Systems
User-mode Secret Protection (SP) architecture
A High Performance SoC: PkunityTM
Presentation transcript:

Novel Methods of Augmenting High Performance Processors with Security Hardware Jonathan Valamehr PhD Defense, UC Santa Barbara May 7, 2013 Committee: Prof. Timothy Sherwood (chair) Prof. Fred Chong Prof. Peter Michael Meliar-Smith Prof. Theodore Huffmire 1

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 2 Modern Microprocessors Intro/Motivation

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 3 Modern Microprocessors Intro/Motivation  Commercial CPU tradeoffs:  Performance  Power  Area  Cost  Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 4 Modern Microprocessors Intro/Motivation  Security  Confidentiality  Integrity  Availability

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 5 Modern Microprocessors  Flurry of hardware attacks  Side channel attacks (Kocher 1996, Percival 2005, Bernstein 2005)  Power draw (Kocher et al. 1999, Jasper 2011)  EM analysis (Gandolfi et al. 2001, Agrawal et al. 2002)  Physical tamper  Memory remanence (Soden et al. 1995, Halderman et al. 2008) Intro/Motivation

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 6 Modern Microprocessors Intro/Motivation  High Assurance CPUs  High development costs  Small market share  Time-consuming to design  Commercial hardware still outperforms by 100x (and growing…)

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 7 Modern Microprocessors Intro/Motivation Commercial Processors (high speed) High Assurance Processors (secure) The solution

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 8 New Technology – 3D Integration  3D Integration  2 or more dies stacked as one system  Foundry level option Base Processor Second die 3D Crypto

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 9 Thesis Statement  The functionality of a processor can be extended after making minimal changes to its design. We introduce several novel methods of adding security to processors through the use of 3D Integration, resulting in secure processors that retain high performance. Intro/Motivation

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 10 Outline  Intro/Motivation -the what  3D Crypto -the why  3D Sec -the how  3D Extensible ISAs -the what else  Conclusion 3D Crypto

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 11 3D Crypto - Motivation  Current Crypto Co-processors  Off-die co-processor, or utilizing core in CMPs  Prone to tamper, vulnerable to side-channels  Lower performance  Ideal Crypto Co-processors  High integrity of data being processed  Tamper-proof and immune to attacks  High performance 3D Crypto

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 12 3D Crypto Co-processor Main Processor Crypto Co-processor 3D Crypto

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 13 Security Ramifications  Threat Models (Valamehr et al. 2011)  Physical tamper  Memory remanence  Access-driven cache side-channel attacks  Time-driven cache side-channel attacks  Fault analysis  Electromagnetic analysis  Power analysis  Thermal analysis 3D Crypto

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 14 Perf/Power/Area/Cost  Potential cost savings with 3D  Use of older technologies  Relationship between:  Performance  Power  Cost  Area 3D Crypto

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 15 Perf/Power/Area/Cost 3D Crypto

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 16 Outline  Intro/Motivation -the what  3D Crypto -the why  3D Sec -the how  3D Extensible ISAs -the what else  Conclusion 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 17 Current Trends  Ideal: Fast and affordable high assurance systems  Resilient against attacks  Low cost  High performance 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 18 Solution  3D Integration  Optional security layer Base Processor Second die 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 19 3D-Sec: Idea  Past Work: 3D Passive Monitors (Mysore et al. 2006)  Analyze data from base processor  Our Contribution – 3D Active Monitors (Valamehr et al. 2010)  Information flow control  Arbitration of communication  Partitioning of resources 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 20 3D-Sec: Idea  Benefits with 3D Integration Security ArchitecturePerformanceAccess to internal signals Security separate Off-chip coprocessor LowNoYes On-chip HighYesNo 3D layer HighYes 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 21 3D-Sec: Idea  Challenge  Normal operation if 3D layer absent  Security functions if 3D layer present 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 22 3D Security Layer – Circuit Level Primitives  Circuit-level primitives for an active monitor (a) Tapping (b) Re-routing(c) Overriding(d) Disabling = 3D layer connections= Signal flow 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 23 3D Security Layer – Tapping  Tapping sends requested signal to the 3-D control plane Tapping 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 24 3D Security Layer – Disabling  Disabling effectively blocks the transmission of signals Disabling X 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 25 3D Security Layer – Disabling  Theoretical 3-D Application: Mutual Trust Shared Bus Protocols Shared L2 $ Core 1 L1 $ Core 0 L1 $ Shared Bus = Post to the 3-D control plane = Signal flow...… 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 26 3D Security Layer – Re-routing  Re-routing sends requested signals to 3-D plane, and blocks their original transmission Re-routing X 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 27 3D Security Layer – Re-routing  Theoretical 3-D Application: Crypto Co-processor Standard Execution Pipeline AES 3-D Control Plane 1. Crypto Instruction2. Result Reg File L1 $ Crypto Control Unit Computation Plane RSADES …… …… INST 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 28 3D Security Layer – Overriding  Overriding blocks transmission of signal, while simultaneously injecting a new value Overriding 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion  Gate-level primitives 29 3D Security Layer – Gate Level Primitives in out in out in out in out Tapping Rerouting Disabling Overriding 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 30 3D Security Layer – General Primitive  General primitive 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 31 3D Security  Area overhead of general primitive(s) DesignArea of design (90nm Library Area Units) 1 General Primitive General Primitives Stage MIPS Pipelined Processor240, % increase 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 32 Background – Side-Channel Attacks  Access-driven cache attack (Percival 2005) Victim Process Shared Cache Attacker Process 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 33 3D Security Layer – Example Application  3-D Cache Eviction Monitor  Keep trusted process cache lines locked  Maintain secrecy of the private key 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 34 3D Security Layer – Example Application  3D Cache Eviction Monitor 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 35 3D Security Layer – Example Application  Cache Performance 3D Security

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 36 Outline  Intro/Motivation -the what  3D Crypto -the why  3D Sec -the how  3D Extensible ISAs -the what else  Conclusion 3D Extensible ISAs

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 37 3D Extensible ISAs - Idea  3D layer that implements new instructions  Connects to control unit on existing processor  May have new functional units  Extends the ISA of processor  Allows reuse of fast processor  Examples  Multimedia  Crypto  Other ISAs 3D Extensible ISAs

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 38 3D Extensible ISAs - Approach  Use circuit-level primitives  Find hook points  What data does the 3D layer need?  Which signals does the 3D need to change?  Design Control unit with free opcodes  Set aside a set of opcodes as available – NoOPs on base layer  Stall signal (for “asynchronous” execution) 3D Extensible ISAs

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 39 Circuit-Level Primitives  Tapping  Rerouting  Overriding 3D Extensible ISAs

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 40 Hook Points Read opcode and register addresses (Tap) If opcode isn’t covered: NoOP Route register values if shared with 3-D layer (Reroute) Replace data (Override) 3D Extensible ISAs 3-D instruction module

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 41 Control Unit Design  Design Control unit with free opcodes  Set aside a set of opcodes as available  NoOPs on base layer  Ensure they are explicitly defined  Increase writeback mux size 3D Extensible ISAs

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 42 Proof-Of-Concept 3D Extensible ISAs

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 43 Results  5-stage pipelined CPU  Tested benchmarks for verification and execution time  5-stage + AES core  Tested benchmarks for verification and execution time – matched 5-stage by itself  Insert Crypto instructions in benchmark  AES core executes and writes back correctly 3D Extensible ISAs

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 44 3D Extensible ISAs  Area overhead of general primitive(s) DesignArea of design (90nm Library Area Units) 1 General Primitive General Primitives8831 AES core34,870 5-Stage MIPS Pipelined Processor240, % increase 3D Extensible ISAs

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 45 Outline  Intro/Motivation -the what  3D Crypto -the why  3D Sec -the how  3D Extensible ISAs -the what else  Conclusion Conclusion

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 46 Future Directions  Practical extensions  Sets of general hook points  3DSec applications  3D ISA - heterogeneous architectures  Physical realizations  3DSec chip  Test functions Conclusion

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 47 Publications A 3D Split Manufacturing Approach to Trustworthy System Development Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, David Marangoni-Simonsen, Ted Huffmire, Cynthia Irvine, and Timothy Levin. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Special Section on Three-dimensional Integrated Circuits and Microarchitectures, Vol. 32, No. 4, Pages A 3D Split Manufacturing Approach to Trustworthy System Development A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, Cetin Kaya Koc, Timothy Levin, and Timothy Sherwood. Festschrift Jean- Jacques Quisquater, to appear, D. Naccache, editor, LNCS Nr. 6805, Springer, A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors Hardware Assistance for Trustworthy Systems through 3-D Integration Jonathan Valamehr, Mohit Tiwari, and Timothy Sherwood, Ryan Kastner, Ted Huffmire, Cynthia Irvine and Timothy Levin. Proceedings of the Annual Computer Security Applications Conference (ACSAC), December Austin, Texas. Hardware Assistance for Trustworthy Systems through 3-D Integration Hardware Trust Implications of 3-D Integration Ted Huffmire, Timothy Levin, Michael Bilzor, Cynthia Irvine, Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, and Ryan Kastner. Workshop on Embedded Systems Security (WESS), October Scottsdale, Arizona. Hardware Trust Implications of 3-D Integration Trustworthy System Security through 3-D Integrated Hardware Ted Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy Levin, Thuy D. Nguyen, and Cynthia Irvine. Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST-2008) June Anaheim, CA. Trustworthy System Security through 3-D Integrated Hardware High-Assurance System Support through 3-D Integration Theodore Huffmire, Tim Levin, Cynthia Irvine, Thuy Nguyen, Jonathan Valamehr, Ryan Kastner, and Tim Sherwood. NPS Technical Report NPS-CS , November High-Assurance System Support through 3-D Integration Conclusion

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 48 Publications Inspection Resistant Memory Architectures Jonathan Valamehr, Andrew Putnam, Daniel Shumow, Melissa Chase, Seny Kamara, Vinod Vaikuntanathan, and Timothy Sherwood. IEEE Micro: Micro's Top Picks from Computer Architecture Conferences (IEEE Micro - top pick), May-June Inspection Resistant Memory Architectures Inspection Resistant Memory: Architectural Support for Security from Physical Examination Jonathan Valamehr, Andrew Putnam, Daniel Shumow, Melissa Chase, Seny Kamara, Vinod Vaikuntanathan, and Timothy Sherwood. Proceedings of the International Symposium of Computer Architecture. (ISCA), June Portland, Oregon. Inspection Resistant Memory: Architectural Support for Security from Physical Examination Crafting a Usable Microkernel, Processor, and I/O System with Strict and Provable Information Flow Security Mohit Tiwari, Jason Oberg, Xun Li, Jonathan Valamehr, Timothy Levin, Ben Hardekopf, Ryan Kastner, Frederic T Chong, and Timothy Sherwood. in Proceedings of the International Symposium of Computer Architecture (ISCA), June San Jose, CA. Crafting a Usable Microkernel, Processor, and I/O System with Strict and Provable Information Flow Security A Small Cache of Large Ranges: Hardware Methods for Efficiently Searching, Storing, and Updating Big Dataflow Tags Mohit Tiwari, Banit Agrawal, Shashidhar Mysore, Jonathan Valamehr, and Timothy Sherwood. Proceedings of the International Symposium on Microarchitecture (Micro), November Lake Como, Italy. A Small Cache of Large Ranges: Hardware Methods for Efficiently Searching, Storing, and Updating Big Dataflow Tags Designing Secure Systems on Reconfigurable Hardware Ted Huffmire, Brett Brotherton, Nick Callegari, Jonathan Valamehr, Jeff White, Ryan Kastner, and Tim Sherwood. ACM Transactions on Design Automation of Electronic Systems (TODAES) Vol 13 No 3, July Designing Secure Systems on Reconfigurable Hardware Opportunities and Challenges of using Plasmonic Components in Nanophotonic Architectures Hassan Wassel, Daoxin Dai, Luke Theogarajan, Jennifer Dionne, Mohit Tiwari, Jonathan Valamehr, Frederic Chong, and Timothy Sherwood. IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS) To appear Opportunities and Challenges of using Plasmonic Components in Nanophotonic Architectures Towards Chip-Scale Plasmonic Interconnects Hassan M. G. Wassel, Mohit Tiwari, Jonathan Valamehr, Luke Theogarajan, Jennifer Dionne, Frederic T. Chong, and Timothy Sherwood. Workshop on the Interaction between Nanophotonic Devices and Systems (WINDS) December Atlanta, Georgia. Towards Chip-Scale Plasmonic Interconnects Conclusion

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 49 Acknowledgements  Labmates  Committee members  Collaborators at NPS, UCSD, MSR, GA Tech  Janet Kayfetz Conclusion

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion  Start up in Palo Alto, CA 50 What’s next? Conclusion

3-D Security 51 Thank you!

 Intro/Motivation  3D Crypto  3D Security  3D Extensible ISAs  Conclusion 52 Thesis Statement  The functionality of a processor can be extended after making minimal changes to its design. We introduce several novel methods of adding security to processors through the use of 3D Integration, resulting in secure processors that retain high performance. Intro/Motivation