Completed
Hardware Essential to Consider in the context of Security
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hardware - A Double-Edged Sword for Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Tortuga Logic
- 2 Hardware Essential to Consider in the context of Security
- 3 Hardware as a Trust Anchor
- 4 Security Analysis Must Consider Entire System • Vulnerabilities hide in design complexity and interactions between different system components
- 5 Example: Flawed Root of Trust Design
- 6 Hardware is Highly Configurable
- 7 Example: Default Hardware Configuration is Insecure
- 8 Example: Secure Debug Configuration Inconvenient
- 9 Security Requires Alignment Across Many Stakeholders
- 10 Example: Dynamic Voltage and Frequency Scaling
- 11 Example: Speculative and Out-of-Order Execution
- 12 Industry-Wide Hardware Security Initiatives . Challenge: Security requires alignment between stakeholders in the hardware ecosystem which span multiple companies and countries
- 13 Hardware Security Development Lifecycle (HSDL)
- 14 Hardware Information Flow Analysis (IFA) • Challenge: Security specification and verification requires time and resources . Using tools where information flow is a first-class concept streamlines bot…
- 15 Requirements for Secure Hardware
- 16 Hardware is a Double-Edged Sword We All Wield Together • IP Providers and SoC Vendors