Design for Security: The Hardware-Up Principle
Event details
Date | 04.11.2013 |
Hour | 09:30 › 11:00 |
Speaker |
Prof. Simha Sethumadhavan, Computer Science, Columbia University |
Location | |
Category | Conferences - Seminars |
In this talk, Simha Seethumadhavan will describe a new design principle for security : the hardware-up principle. Hardware-up security means that systems should be secured starting from hardware instead of the existing popular approach where software layers are secured, assuming that the lower layers are secure when they are not. He will discuss how systems designed for security from hardware-up offer unique advantages unavailable in current protection systems: a smaller attack surface, energy-efficient execution, and the ability to reason about security compositionally.
He will illustrate hardware-up benefits through three case studies.
For the first hardware-up case study, he will discuss how we can prevent attackers from taking advantage of unintentional hardware design flaws. Taking microarchitectural side channels as an example, he will discuss a new methodology that computer architects can use to reason micro architectural side-channels at processor design time.
Attackers can also intentionally seaken hardware to break systems. In the second case study, he will discuss how hardware itself can be created in a manner that provides assurance that its security has not been compromised due to design-time backdoors. He will describe a technique for silencing backdoors and a prototype built using this technique that incurs less than 8% area overhead and negligible performance overheads.
Finally, he will describe a hardware malware detector, a first of its kind, that is vastly simpler to implement compared to traditional software malware detector.
He will illustrate hardware-up benefits through three case studies.
For the first hardware-up case study, he will discuss how we can prevent attackers from taking advantage of unintentional hardware design flaws. Taking microarchitectural side channels as an example, he will discuss a new methodology that computer architects can use to reason micro architectural side-channels at processor design time.
Attackers can also intentionally seaken hardware to break systems. In the second case study, he will discuss how hardware itself can be created in a manner that provides assurance that its security has not been compromised due to design-time backdoors. He will describe a technique for silencing backdoors and a prototype built using this technique that incurs less than 8% area overhead and negligible performance overheads.
Finally, he will describe a hardware malware detector, a first of its kind, that is vastly simpler to implement compared to traditional software malware detector.
Practical information
- Informed public
- Free
Organizer
- Babak Falsafi, PARSA
Contact
- Valérie Locca