Главная
Study mode:
on
1
Tortuga Logic
2
Hardware Essential to Consider in the context of Security
3
Hardware as a Trust Anchor
4
Security Analysis Must Consider Entire System • Vulnerabilities hide in design complexity and interactions between different system components
5
Example: Flawed Root of Trust Design
6
Hardware is Highly Configurable
7
Example: Default Hardware Configuration is Insecure
8
Example: Secure Debug Configuration Inconvenient
9
Security Requires Alignment Across Many Stakeholders
10
Example: Dynamic Voltage and Frequency Scaling
11
Example: Speculative and Out-of-Order Execution
12
Industry-Wide Hardware Security Initiatives . Challenge: Security requires alignment between stakeholders in the hardware ecosystem which span multiple companies and countries
13
Hardware Security Development Lifecycle (HSDL)
14
Hardware Information Flow Analysis (IFA) • Challenge: Security specification and verification requires time and resources . Using tools where information flow is a first-class concept streamlines bot…
15
Requirements for Secure Hardware
16
Hardware is a Double-Edged Sword We All Wield Together • IP Providers and SoC Vendors
Description:
Explore the dual nature of hardware in cybersecurity through this 20-minute conference talk from USENIX Enigma 2021. Delve into how hardware serves as both a trust anchor and a potential vulnerability in systems ranging from IoT devices to datacenter infrastructure. Gain insights into system-level threats addressed by hardware architectures, and examine real-world examples where performance-enhancing features inadvertently create security risks. Understand the challenges faced by chip vendors and system designers in detecting and preventing hardware vulnerabilities, and learn about promising methodologies and solutions in this field. Discover the complexities of hardware security, including the need for alignment across multiple stakeholders, the importance of secure configurations, and the impact of features like dynamic voltage scaling and speculative execution on system security.

Hardware - A Double-Edged Sword for Security

USENIX Enigma Conference
Add to list