CIS700: Hardware Support for Security Professor Milo Martin

Slides:



Advertisements
Similar presentations
Widening the Research Pipeline Update to NSF/CISE BPC Evaluation Workshop December 7, 2006.
Advertisements

Revision and exam technique
Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Chapter 1  Introduction 1 Chapter 1: Introduction.
G53SEC 1 Hardware Security The (slightly) more tactile side of security.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
Final Portfolio Project Edwing Llangari. Content 6.6 (information request) – My assignment 7.4 (refusal) – My assignment 8.5 (persuasive) – My assignment.
Architecture Support for Security Peter Chapman Michael Maass.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
G53SEC 1 Revision & Exam Tips G53SEC. 2 Today’s Lecture: Revision Summary + Tips Exam Tips Preliminary Coursework Feedback.
Security Systems Theory UG2 Module Introduction Themes 1. Top down design of security systems – security technologies as 'black boxes'. 2. Internal design.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Fall 2004 WWW IS112 Prof. Dwyer Intro1: Overview and Syllabus Professor Catherine Dwyer.
CSCD 555 Research Methods for Computer Science
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
CS590 Z Software Defect Analysis Xiangyu Zhang. CS590F Software Reliability What is Software Defect Analysis  Given a software program, with or without.
Description of a Foundations of Calculus Course for Teachers CMC-Asilomar December 2005 Karen Payne Aguilar.
Software Engineering Georges Grinstein Olsen 301E Class materials:
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Administrivia Interviews this week: ex-TA Paul Hale Nate's office hours, as usual: Wed 2-4 The final survey will be up by Thursday: –you NEED to do this,
Increasing student investment in the first three weeks Mark Salisbury Kimberly Dyer.
CIT 694 Introduction. CISSP Certified Information Systems Security Professional “The credential for professionals who develop policies and procedures.
CMSC 414 Computer and Network Security Jonathan Katz.
Basic English II Jay Melton. We will meet twice a week One class meeting in 小 7 The other class meeting in 情 2.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Studying for the PhD Qualifying Exam Electrical and Computer Engineering Department Professor Adam Hoover Chair of Computer Architecture Exam Area Fall,
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Computer Networks Lecture 1: Logistics Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Updated Today's talk should help you to understand better  what your responsibilities for this module  how you will be taught  how you.
Welcome to CS 221! First Course in Computer Science for Engineers.
Welcome to Introduction to Working with Expert Texts.
Chapter 1  Introduction 1 Chapter 1: Introduction.
IGERT: Computational Transportation Educational Program August 22, 2007 Bob Sloan.
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
How to Read a Text book Or How to get the most out of a text book.
Principles of Computer Science I Honors Section Note Set 1 CSE 1341 – H 1.
ICS-FORTH 25-Nov Infrastructure for Scalable Services Are we Ready Yet? Angelos Bilas Institute of Computer Science (ICS) Foundation.
Your Roadmap for Success Alice: “Would you tell me, please, which way I ought to go from here?" Cat: "That's depends a good deal on where you want to get.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
CIS 842: Specification and Verification of Reactive Systems Lecture ADM: Course Administration Copyright , Matt Dwyer, John Hatcliff, Robby. The.
Computer Science, Algorithms, Abstractions, & Information CSC 2001.
What students really think of their reading lists: reading list software at the University of Huddersfield Alison Sharman 2015.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
“I did find that my students benefited from the system – they were able to do a lot more homework problems, giving them more time to practice the topics.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
1 Student and Supervisor Panel Starting a PhD Associate Professor John Thornton RHD Coordinator for School of ICT.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.0 Big Picture, Vision.
So: You Want To Be An Environmental Historian? Dagomar Degroot.
Memory Protection through Dynamic Access Control Kun Zhang, Tao Zhang and Santosh Pande College of Computing Georgia Institute of Technology.
Information Systems Security Winter
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
CSCD 303 Essential Computer Security
Introduction to Computer Security II
Lecture 19: Proof-Carrying Code Background just got here last week
Introduction Security Intro 1.
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
CSCD 303 Essential Computer Security
GSP 470/570 Advanced Geospatial Analysis and Modeling
Presentation transcript:

CIS700: Hardware Support for Security Professor Milo Martin

CIS Why Am I Teaching This Course? Security is important Lots of reasons why Security is hard No silver bullet Much deeper than stopping buffer overflows My expertise Computer architecture and related issues Not (yet) a security expert Key question Can hardware support improve the security of computing systems? This course We’ll explore this question

CIS Who are you? What is your experience? Your background? Your interest in this course?

CIS Computer Security Computer security is a broad field Traditional computing systems issues Cryptography Physical security Law enforcement and public policy Psychology and economics Goals Main goal: “thwart attacks” Privacy, authentication, detection, forensics, digital rights management (DRM), attack preemption

CIS Security Engineering Is there such a thing as a secure system? Security is all about tradeoffs Cost vs security  of attack, of countermeasure, value of item protected Usability vs security Risk management Pragmatism, not proofs Must consider “big pictures” issues Unexpected attacks (for example, social engineering)  Home security analogy  Three lightbulbs story  Flying vs driving analogy Again, key question: can hardware be part of the solution? Change the engineering tradeoffs?

CIS Course Format Glorified reading and discussion group We’ll read papers over the semester Goal: vigorous in-class discussion Reading analysis before each class Answer a few questions about the readings Due at 10:00am the day of class Keeps you honest on the reading; gets us thinking Short essays 2-3 short essays answering a big-picture question about what we’ve talked about Looking for deep insight (FYI: Each aspect, 33% of your course grade)

CIS Who Should Take This Course? Targeted for PhD students actively researching either Computer architecture Security (Or maybe just general systems) Minimum, should have substantial background in either: Computer architecture and hardware issues (501 as a minimum) Computer security (coursework or experience) Also, past experience reading “systems” papers a must If you’ve never read an academic research paper before, look out We’re going to do a lot of reading

CIS Disclaimer: What I Know (and Don’t Know) Computer hardware I know a thing or two about a thing or two Computer security Lots of informal knowledge, not really an expert (yet) How do they fit together? I don’t know (yet) Can’t yet give you the “big picture” Haven’t yet read all the papers we’ll be reading Result: course will evolve as we go

CIS General Course Topics Security background Focusing on “Security Engineering” Readings from Anderson’s book Hardware-based: Cryptographic smart cards and co-processors Dynamic information-flow tracking Buffer-overflow prevention Secure information processing Reducing runtime overheads of secure programming languages Fast cryptography Fine-grain memory protection Tamper resistant systems Code injection prevention Various "trusted" computing initiatives Many low-level software issues covered (by necessity)

CIS Course Readings Anderson’s book for background Some at course beginning Some spread throughout course Many conference papers Architecture conferences: ISCA, ASPLOS, MICRO, HPCA Systems and security conferences: SOSP, Usenix Reading list will evolve We’ll touch on lots of topics How long we spend on each topic will vary Based on class input, dynamically adjust as course proceeds

CIS Next Time Readings from Anderson’s “Security Engineering” Preface, Forward Chapters 1 & 2 Copies outside 3rd floor CIS office by end of today Purchase book for next week Answer these questions (10:00am Wed): Q1: In what ways are the disciplines of security engineering and computer engineering similar? In what ways are these different? Q2: How could the identify-friend-or-foe (IFF) system described in be modified to prevent the described attack? Q3: What didn’t you understand about the reading Come ready to discuss