Hardware - A Double-Edged Sword for Security

Hardware - A Double-Edged Sword for Security

USENIX Enigma Conference via YouTube Direct link

Hardware is Highly Configurable

6 of 16

6 of 16

Hardware is Highly Configurable

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hardware - A Double-Edged Sword for Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Tortuga Logic
  2. 2 Hardware Essential to Consider in the context of Security
  3. 3 Hardware as a Trust Anchor
  4. 4 Security Analysis Must Consider Entire System • Vulnerabilities hide in design complexity and interactions between different system components
  5. 5 Example: Flawed Root of Trust Design
  6. 6 Hardware is Highly Configurable
  7. 7 Example: Default Hardware Configuration is Insecure
  8. 8 Example: Secure Debug Configuration Inconvenient
  9. 9 Security Requires Alignment Across Many Stakeholders
  10. 10 Example: Dynamic Voltage and Frequency Scaling
  11. 11 Example: Speculative and Out-of-Order Execution
  12. 12 Industry-Wide Hardware Security Initiatives . Challenge: Security requires alignment between stakeholders in the hardware ecosystem which span multiple companies and countries
  13. 13 Hardware Security Development Lifecycle (HSDL)
  14. 14 Hardware Information Flow Analysis (IFA) • Challenge: Security specification and verification requires time and resources . Using tools where information flow is a first-class concept streamlines bot…
  15. 15 Requirements for Secure Hardware
  16. 16 Hardware is a Double-Edged Sword We All Wield Together • IP Providers and SoC Vendors

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.