Hardware - A Double-Edged Sword for Security

Hardware - A Double-Edged Sword for Security

USENIX Enigma Conference via YouTube Direct link

Requirements for Secure Hardware

15 of 16

15 of 16

Requirements for Secure Hardware

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hardware - A Double-Edged Sword for Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Tortuga Logic
  2. 2 Hardware Essential to Consider in the context of Security
  3. 3 Hardware as a Trust Anchor
  4. 4 Security Analysis Must Consider Entire System • Vulnerabilities hide in design complexity and interactions between different system components
  5. 5 Example: Flawed Root of Trust Design
  6. 6 Hardware is Highly Configurable
  7. 7 Example: Default Hardware Configuration is Insecure
  8. 8 Example: Secure Debug Configuration Inconvenient
  9. 9 Security Requires Alignment Across Many Stakeholders
  10. 10 Example: Dynamic Voltage and Frequency Scaling
  11. 11 Example: Speculative and Out-of-Order Execution
  12. 12 Industry-Wide Hardware Security Initiatives . Challenge: Security requires alignment between stakeholders in the hardware ecosystem which span multiple companies and countries
  13. 13 Hardware Security Development Lifecycle (HSDL)
  14. 14 Hardware Information Flow Analysis (IFA) • Challenge: Security specification and verification requires time and resources . Using tools where information flow is a first-class concept streamlines bot…
  15. 15 Requirements for Secure Hardware
  16. 16 Hardware is a Double-Edged Sword We All Wield Together • IP Providers and SoC Vendors

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.