hardware-based security: trouble and hopemueller/esns07/smith.pdf · based techniques to enhance...

25
Vox Clamantis in Deserto ARO Planning Workshop Security of Embedded Systems and Networks Hardware-Based Security: Trouble and Hope Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH USA http://www.cs.dartmouth.edu/~sws/ February 22, 2007

Upload: others

Post on 06-Jul-2020

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

ARO Planning Workshop Security of Embedded Systems and Networks

Hardware-Based Security:Trouble and Hope

Sean W. SmithDepartment of Computer Science

Dartmouth CollegeHanover, NH USA

http://www.cs.dartmouth.edu/~sws/

February 22, 2007

Page 2: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

Page 3: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

?

Page 4: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

?

Page 5: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

?

Page 6: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

?

Page 7: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

?

Page 8: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

?

Page 9: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

?

Page 10: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Trouble Area #1:

Not Thinking about Enough Levels

?User User

User UserUser User

Page 11: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Examples

• Java type-safety vs. light bulbs

• Type-safe C variant for kernel coding vs. kernel coders

• hardware-based attestation vs. the computational entity

• hardware-based attestation vs. the operating system

• IBM 4758 platform vs. API flaws in the CCA app

• Cyber-Manhattan project vs. economic roll-out

Page 12: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Examples

• Java type-safety vs. light bulbs

• Type-safe C variant for kernel coding vs. kernel coders

• hardware-based attestation vs. the computational entity

• hardware-based attestation vs. the operating system

• IBM 4758 platform vs. API flaws in the CCA app

• Cyber-Manhattan project vs. economic roll-out

Page 13: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Examples

• Java type-safety vs. light bulbs

• Type-safe C variant for kernel coding vs. kernel coders

• hardware-based attestation vs. the computational entity

• hardware-based attestation vs. the operating system

• IBM 4758 platform vs. API flaws in the CCA app

• Cyber-Manhattan project vs. economic roll-out

Page 14: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Examples

• Java type-safety vs. light bulbs

• Type-safe C variant for kernel coding vs. kernel coders

• hardware-based attestation vs. the computational entity

• hardware-based attestation vs. the operating system

• IBM 4758 platform vs. API flaws in the CCA app

• Cyber-Manhattan project vs. economic roll-out

Page 15: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Examples

• Java type-safety vs. light bulbs

• Type-safe C variant for kernel coding vs. kernel coders

• hardware-based attestation vs. the computational entity

• hardware-based attestation vs. the operating system

• IBM 4758 platform vs. API flaws in the CCA app

• Cyber-Manhattan project vs. economic roll-out

Page 16: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

More Trouble Areas

2. Cryptography's questionable future

Page 17: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

More Trouble Areas

2. Cryptography's questionable future

Page 18: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

More Trouble Areas

2. Cryptography's questionable future

3. Keeping and using secrets

• effectively

• affordably

Page 19: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

More Trouble Areas

2. Cryptography's questionable future

3. Keeping and using secrets

• effectively

• affordably

Page 20: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Reasons for Hope

1. Industry is open to designing and deploying hardware-based techniques to enhance security.

Page 21: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Reasons for Hope

1. Industry is open to designing and deploying hardware-based techniques to enhance security.

Page 22: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Reasons for Hope

1. Industry is open to designing and deploying hardware-based techniques to enhance security.

2. The consequences of keeping up with Moore's Law

Page 23: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Reasons for Hope

1. Industry is open to designing and deploying hardware-based techniques to enhance security.

2. The consequences of keeping up with Moore's Law

Page 24: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Reasons for Hope

1. Industry is open to designing and deploying hardware-based techniques to enhance security.

2. The consequences of keeping up with Moore's Law

3. Repeated calls for principled revolution

• CRA, I3P, "Cyber-Manhattan Project,"....• This workshop

Page 25: Hardware-Based Security: Trouble and Hopemueller/esns07/smith.pdf · based techniques to enhance security. 2. The consequences of keeping up with Moore's Law. Vox Clamantis in Deserto

Vox Clamantis in Deserto

Thanks

● NSF CAREER, DoJ/DHS, Mellon, Internet2/AT&T● Sun, Intel, Cisco (and IBM Research)

● http://www.cs.dartmouth.edu/~sws/● Trusted Computing Platforms: Design and Applications. Springer, 2005.

For more information:

Sponsors: