Hardware Trust Implications of 3-D Integration Ted Huffmire (NPS), Timothy Levin (NPS), Michael Bilzor (NPS), Cynthia E. Irvine (NPS), Jonathan Valamehr.

Slides:



Advertisements
Similar presentations
MonolithIC 3D Inc., Patents Pending MonolithIC 3D ICs October MonolithIC 3D Inc., Patents Pending.
Advertisements

Supporting Security at the Gate Level: Opportunities and Misconceptions Tim Sherwood UC Santa Barbara.
Novel Methods of Augmenting High Performance Processors with Security Hardware Jonathan Valamehr PhD Defense, UC Santa Barbara May 7, 2013 Committee: Prof.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Addressing Supply Chain Security with Split Manufacturing Ted Huffmire Summer UCI CECS Seminar July 27, 2012.
3Dsec: Trustworthy System Security through 3-D Integrated Hardware Ted Huffmire 14 January 2009.
1 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems Organizers: NC State University & UNC Chapel Hill.
3D-MAPS: 3D Massively Parallel Processor with Stacked Memory Dae Hyun Kim, Krit Athikulwongse, Michael Healy, Mohammad Hossain, Moongon Jung, et al. Georgia.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CS599 Software Engineering for Embedded Systems1 Software Engineering for Real-Time: A Roadmap Presentation by: Mandar Samant Raghbir Singh Banwait.
OCIN Workshop Wrapup Bill Dally. Thanks To Funding –NSF - Timothy Pinkston, Federica Darema, Mike Foster –UC Discovery Program Organization –Jane Klickman,
Randy Fort CS 265 Trusted Platform Modules April 19 th, 2005.
CAD and Design Tools for On- Chip Networks Luca Benini, Mark Hummel, Olav Lysne, Li-Shiuan Peh, Li Shang, Mithuna Thottethodi,
Computer Security: Principles and Practice
Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network Steven R. Balmer & Cynthia E. Irvine Department of Computer Science.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Prardiva Mangilipally
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Stack Management Each process/thread has two stacks  Kernel stack  User stack Stack pointer changes when exiting/entering the kernel Q: Why is this necessary?
Computer System Architectures Computer System Software
Bootstrapping Trust in Commodity Computers Bryan Parno, Jonathan McCune, Adrian Perrig 1 Carnegie Mellon University.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 20 October 28, 2004.
Introspective 3D Chips S. Mysore, B. Agrawal, N. Srivastava, S. Lin, K. Banerjee, T. Sherwood (UCSB), ASPLOS 2006 Shimin Chen (LBA Reading Group Presentation)
A 3D Data Transformation Processor Dimitrios Megas, Kleber Pizolato, Timothy Levin, and Ted Huffmire WESS 2012 October 11, 2012.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
LiNK: An Operating System Architecture for Network Processors Steve Muir, Jonathan Smith Princeton University, University of Pennsylvania
COT 4600 Operating Systems Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM.
Virtualization: Not Just For Servers Hollis Blanchard PowerPC kernel hacker.
Novel Methods of Augmenting High Performance Processors with Security Hardware Jonathan Valamehr PhD Proposal, UC Santa Barbara May 10, 2012 Committee:
Slide No. 1 Course: Logic Design Dr. Ali Elkateeb Topic: Introduction Course Number: COMP 1213 Course Title: Logic Design Instructor: Dr. Ali Elkateeb.
Threats and Challenges in FPGA Security Ted Huffmire Naval Postgraduate School December 10, 2008.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Detecting Targeted Attacks Using Shadow Honeypots Authors: K.G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A.D. Keromytis Published:
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
Zero - G CONNECTING THE INTERNET OF THINGS. Introduction to Zero -G.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
EE 466/586 VLSI Design Partha Pande School of EECS Washington State University
Implementing Memory Protection Primitives on Reconfigurable Hardware Brett Brotherton Nick Callegari Ted Huffmire.
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Fan Out WLP Technology Packaging as 2, 3D System in Packaging Solution
The Role of Virtualization in Exascale Production Systems Jack Lange Assistant Professor University of Pittsburgh.
The ATLAS Global Trigger Processor U. Schäfer Phase-2 Upgrade Uli Schäfer 1.
Hardware Trojan (HT) Detection in 3-D IC Wafi Danesh Instructor: Dr. Christopher Allen EECS 713 High-Speed Digital Circuit Design Final Project Presentation.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
CS244-Introduction to Embedded Systems and Ubiquitous Computing Instructor: Eli Bozorgzadeh Computer Science Department UC Irvine Winter 2012.
Introduction to ECE530 Analog Electronics What is it? Outline Why?
DUSD(Labs) GSRC Calibrating Achievable Design 11/02.
System Components Operating System Services System Calls.
Unit 2 Technology Systems
Trusted Computing and the Trusted Platform Module
Cybersecurity First Principles
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Cybersecurity: Threat Matrix
Outline What does the OS protect? Authentication for operating systems
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Virtualization Techniques
Bastion secure processor architecture
COT 4600 Operating Systems Fall 2010
Co-designed Virtual Machines for Reliable Computer Systems
Presentation transcript:

Hardware Trust Implications of 3-D Integration Ted Huffmire (NPS), Timothy Levin (NPS), Michael Bilzor (NPS), Cynthia E. Irvine (NPS), Jonathan Valamehr (UCSB), Mohit Tiwari (UCSB), Timothy Sherwood (UCSB), and Ryan Kastner (UCSD) 26 October 2010 Workshop on Embedded Systems Security (WESS)

Nile River Mystery on the Nile: Just Whose River Is It? Ethiopia Claims High Gound in Right-to-Nile Debate Thirsty Egypt Clings Tight to the Nile Weekend Edition Sunday (npr.org)

[Koyanagi05]

[Koyanagi05] Timeline

Alternative 3-D Approaches PoP [Lim10] Wire Bonding (SiP) [Amkor09]

Alternative 3-D Approaches PoP [Lim10]

Alternative 3-D Approaches [Amkor10]

Alternative 3-D Approaches Face-to-Face [Loh07]

Alternative 3-D Approaches Face-to-Back [Loh07]

What is 3Dsec? Economics of High Assurance –High NRE Cost, Low Volume –Gap between DoD and Commercial Disentangle security from the COTS –Use a separate chip for security –Use 3-D Integration to combine: 3-D Control Plane Computation Plane –Need to add posts to the COTS chip design Dual use of computation plane

Pro’s and Con’s Why not use a co-processor? On-chip? Pro’s –High bandwidth and low latency –Controlled lineage –Direct access to internal structures Con’s –Thermal and cooling –Design and testing –Manufacturing yield

Thermal Challenges Thermal Simulation [Loh06, Melamed09]

Yield Challenges Wafer-to-Wafer Bonding [Euronymous07]

Testing Challenges [Thärigen10]

Cost Cost of fabricating systems with 3-D –Fabricating and testing the security layer –Bonding it to the host layer –Fabricating the vias –Testing the joined unit

This Paper Can a 3-D control plane provide useful secure services when it is conjoined with an untrustworthy computation plane? Yes, provided: –Self-protection –Dependency Layering

Face-to-Back Bonding [Valamehr10]

Primitives [Valamehr10]

Threat Model Computation plane –Unintentional hardware flaws –Malicious software Not in scope –Malicious inclusions Nullify self-protection –Probing of the control plane –Compromising RF emissions

Security Model Self-protection –Do not place a post that allows the control plane to accept extraneous power, requests, or modifications. Layered dependencies –Control plane should not depend on the computation plane

Layered Dependencies Never depend on a layer of lesser trustworthiness

Dependency Properties Service –Communication (e.g., I/O) –Synchronization Call Resource Creation and Provision –Storage Contention

3-D Application Classes Enhancement of native functions Secure alternate service Isolation and protection Passive monitoring –Information flow tracking –Runtime correctness checks –Runtime security auditing

Design Example Secure Alternate Service

Examples of 3-D Systems Network-on-Chip [Kim07]

Examples of 3-D Systems Network-on-Chip [Kim07]

Examples of 3-D Systems Particle Physics [Demarteau09]

Examples of 3-D Systems Chip Scale Camera Module [Yoshikawa09]

Examples of 3-D Systems 3D-PIC 3-D CMOS Imager [Chang10]

Examples of 3-D Systems 3-D Stacked Retinal Chip [Kaiho09]

Examples of 3-D Systems 3-D Stacked Retinal Chip [Koyanagi05]

Examples of 3-D Systems 3-D FPGAs [Razavi09]

Examples of 3-D Systems 3D-MAPS: Many-core 3-D Processor with Stacked Memory [Lim10] –Solid work!

Examples of 3-D Systems [Eloy10]

Future Work Malicious Inclusions Off-Chip I/O –Wireless –Wired Power Fault-Tolerant Chips for Critical Systems

Wireless: Capacitive Coupling [Kim09]

Wireless: Optical Bidirectional Communication [Dietz03]

Questions? faculty.nps.edu/tdhuffmi