3Dsec: Trustworthy System Security through 3-D Integrated Hardware Ted Huffmire 14 January 2009.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

FPGA (Field Programmable Gate Array)
Technology Drivers Traditional HPC application drivers – OS noise, resource monitoring and management, memory footprint – Complexity of resources to be.
Aviation Safety ProgramSingle Aircraft Accident Prevention April NCC-1-377, Honeywell Tucson Design, Implementation, and Verification of Fault-Tolerant.
A reconfigurable system featuring dynamically extensible embedded microprocessor, FPGA, and customizable I/O Borgatti, M. Lertora, F. Foret, B. Cali, L.
1 Architectural Complexity: Opening the Black Box Methods for Exposing Internal Functionality of Complex Single and Multiple Processor Systems EECC-756.
Programmable Logic Devices
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Addressing Supply Chain Security with Split Manufacturing Ted Huffmire Summer UCI CECS Seminar July 27, 2012.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Addressing the System-on-a-Chip Interconnect Woes Through Communication-Based Design N. Vinay Krishnan EE249 Class Presentation.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Week 1- Fall 2009 Dr. Kimberly E. Newman University of Colorado.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
OCIN Workshop Wrapup Bill Dally. Thanks To Funding –NSF - Timothy Pinkston, Federica Darema, Mike Foster –UC Discovery Program Organization –Jane Klickman,
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CAD and Design Tools for On- Chip Networks Luca Benini, Mark Hummel, Olav Lysne, Li-Shiuan Peh, Li Shang, Mithuna Thottethodi,
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
UCB November 8, 2001 Krishna V Palem Proceler Inc. Customization Using Variable Instruction Sets Krishna V Palem CTO Proceler Inc.
Research Directions for On-chip Network Microarchitectures Luca Carloni, Steve Keckler, Robert Mullins, Vijay Narayanan, Steve Reinhardt, Michael Taylor.
Host Intrusion Prevention Systems & Beyond
3.1Introduction to CPU Central processing unit etched on silicon chip called microprocessor Contain tens of millions of tiny transistors Key components:
PROS & CONS of Proxy Firewall
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
Is Lambda Switching Likely for Applications? Tom Lehman USC/Information Sciences Institute December 2001.
Hardware Trust Implications of 3-D Integration Ted Huffmire (NPS), Timothy Levin (NPS), Michael Bilzor (NPS), Cynthia E. Irvine (NPS), Jonathan Valamehr.
A 3D Data Transformation Processor Dimitrios Megas, Kleber Pizolato, Timothy Levin, and Ted Huffmire WESS 2012 October 11, 2012.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
MILCOM 2001 October page 1 Defense Enabling Using Advanced Middleware: An Example Franklin Webber, Partha Pal, Richard Schantz, Michael Atighetchi,
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Threats and Challenges in FPGA Security Ted Huffmire Naval Postgraduate School December 10, 2008.
1 1 Hosted Network Security EarthLink Complete™ Data.
High Performance Embedded Computing © 2007 Elsevier Chapter 1, part 2: Embedded Computing High Performance Embedded Computing Wayne Wolf.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
MAPLD 2005/254C. Papachristou 1 Reconfigurable and Evolvable Hardware Fabric Chris Papachristou, Frank Wolff Robert Ewing Electrical Engineering & Computer.
2D/3D Integration Challenges: Dynamic Reconfiguration and Design for Reuse.
Axel Jantsch 1 Networks on Chip Axel Jantsch 1 Shashi Kumar 1, Juha-Pekka Soininen 2, Martti Forsell 2, Mikael Millberg 1, Johnny Öberg 1, Kari Tiensurjä.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Section #7: Getting Data from Point A to Point B.
1 SHARCS: Secure Hardware-Software Architectures for Robust Computing Systems Sotiris Ioannidis FORTH.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
An overview of I&C Systems in APR 1400 Parvaiz Ahmed Khand December 28, 2007.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Chapter 1: Explore the Network
Programmable Logic Devices
CSCE 548 Secure Software Development Risk-Based Security Testing
Current Generation Hypervisor Type 1 Type 2.
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Middleware Policies for Intrusion Tolerance
ELEC 7770 Advanced VLSI Design Spring 2016 Introduction
ELEC 7770 Advanced VLSI Design Spring 2014 Introduction
CS 31006: Computer Networks – The Routers
ELEC 7770 Advanced VLSI Design Spring 2012 Introduction
ELEC 7770 Advanced VLSI Design Spring 2010 Introduction
Protect Your Hardware from Hacking and Theft
Characteristics of Reconfigurable Hardware
Multi Core Processing What is term Multi Core?.
Introduction to Network Security
Co-designed Virtual Machines for Reliable Computer Systems
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

3Dsec: Trustworthy System Security through 3-D Integrated Hardware Ted Huffmire 14 January 2009

What is Hardware Security? Many of the issues of hardware security are similar to traditional computer security –Malware, authentication, program analysis, patches, insiders, social engineering, developmental attacks, evaluation, certification and accreditation, flawed implementations, protocols, system-level issues, network security, usability, economic incentives, complexity. Anything can be hacked, but the attacker has finite resources. –Shades of grey rather than black-and-white (“broken” or not) –Make attackers toil, and design systems that “win” decisively –Each security technique has its advantages and disadvantages, and we must understand each technique's limitations. Even crypto has limitations. We need to know what specific attacks each technique is capable of preventing.

What is Hardware Security? Opportunities of hardware –High performance Custom processors for crypto, deep packet inspection, etc. –Direct control –No intermediate OS layers –Physical separation Challenges –Semantic gap –Engineering and fabrication costs

What is Hardware Security? Foundry Trust –Malicious Hardware (a.k.a. “gate-ware”) Trojan Horse, Rootkit, Kill Switch –Design Theft (Protecting Intellectual Property) –Start with a secure design before addressing fabrication security Operational Attacks –Power Analysis, Fault Injection, Heating, Optical –Cold Boot, Probing, Math Errors Developmental Attacks –Malicious Design Tools –Malicious IP System Assurance –Security Architecture, Key Management, PUFs –Formal analysis of IP cores (not a panacea)

What is Hardware Security? Interfaces [Schaumont 2009] –Secure hardware is part of a bigger system. –Secure hardware interfaces are tricky: How do you distinguish red wires from black wires? –Secure hardware interfaces do not exist yet! –Current secure hardware serves software Composition [Schaumont 2009] –This is not trivial. –To resist side channels, you must avoid redundancy. –However, fault tolerance requires increasing redundancy. –How can you build fault-tolerant, side channel resistant systems? Metrics [Schaumont 2009] –Security is dimensionless. –Metrics are absolutely necessary to do meaningful research. –Without metrics, it is impossible to analyze trade-offs. Education: Electrical Engineers are trained to make things happen rather than to make bad things NOT happen [Schaumont 2009]

What is 3Dsec? Economics of High Assurance –High NRE Cost, Low Volume –Gap between DoD and Commercial Disentangle security from the COTS –Use a separate chip for security –Use 3-D Integration to combine: 3-D Control Plane Computation Plane –Need to add posts to the COTS chip design Dual use of computation plane

Trustworthy System Security through 3-D Integrated Hardware 3DSec : Security Layer Processor Layer Cross Section Post Silicon Layer 2 Silicon Layer 1 Goal: Build trustworthy systems using commercial hardware components Problem: Integrating specialized security mechanisms is too costly for hardware vendors Idea: Augment commodity hardware after fabrication with a separate layer of security circuitry Anticipated Benefits: Configurable, protected, low-cost hardware security controls that can override activity in the commodity hardware Privacy Applications: Detect and intercept the execution of malicious code Prevent the microprocessor internals from being exploited to leak crypto keys Tag and Track private information as it flows through a processor

Pro’s and Con’s Why not use a co-processor? On-chip? Pro’s –Bandwidth –The ability to override Con’s –Cooling –Manufacturing yield

Cost Cost of fabricating systems with 3-D –Fabricating and testing the security layer –Bonding it to the host layer –Fabricating the vias –Testing the joined unit

Ramifications Device and Packaging Level Circuit Level Architectural Systems Software Level Application Level

Problems What if the control plane is manufactured in a different process than the computation plane? The computation plane must function as normal in the absence of the the control plane, but must behave differently when the control plane is present. I/O and programming the control plane Actively interfering with the computation plane (timing issues) What to cut in the computation plane?

Goals Cost and performance analysis –Thermal/performance/cost model –FPGA prototypes Circuit-level modifications –Timing and power feasibility –Optimal placement/cost for commodity cores –Automatic insertion with CAD tools Partition, place, optimize

Circuit-Level Modifications Passive vs. Active Monitoring Tapping Re-routing Overriding Disabling

Goals (Continued) Architectural structures –Memory (caches, predictors, scratchpad) –General logic (interconnect, controllers) End-to-end evaluation –Validate methods with design examples –Cache study, cache monitor –System-level security analysis –Dynamic management of 3-D control plane

Applications Information flow tracking Protection mechanism –Cache side channels Safe context switch Secure alternate service Instrumentation Optimal architecture for a given application

Broader Impact Economics of hardware security Use commodity processors Applicable to a wide variety of platforms Education Interdisciplinary scope Multiple universities Attract students to the field Student body diversity

Questions? faculty.nps.edu/tdhuffmi

Additional Slides Additional slides

Low-level architecture Routing through the 3-D control plane

Circuit-Level Modifications Tapping, Re-routing, Overriding, Disabling

Applications Cache monitor