Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hardware Tamper Resistance - Why and How

via YouTube

Overview

Explore hardware tamper resistance techniques and principles in this conference talk from DerbyCon 4. Delve into various types of anti-tamper methods, including physical and electronic systems, and understand the critical principles behind them. Learn about the evolution of smartcards, FIPS, and HSMs, and discover why electronics require anti-tamper protection. Examine new approaches like machine-verifiable seals and remote verification for servers. Investigate trusted computing technologies, virtualization-based security, and secure multiparty systems. Gain insights into general design principles for tamper-resistant hardware and explore options for implementing high-end and low-end HSMs, remote keys, and layered systems. Understand the implications for projects like PirateBay, CloudFlare, and open-source initiatives in the context of hardware security.

Syllabus

Intro
Me
What is tampering?
Types of Anti-Tamper
Critical principle
Physical Systems
Physical vs. Electronic
Why do electronics need anti-tamper?
Smartcards
FIPS and HSMS
What changed?
Users are lazy
31c3/RSA work with Eric Michaud
New way: Machine-verifiable seals
Remote verifiable seals
So, servers?
IANA/ICANN HSM
In-between systems
Trusted Computing Group • Intel TXT, AMD SVM (+ ARM TrustZone, MTM) • Derived from DRM efforts ("Palladiurn") in 1990s
Intel SGX
Virtualization-based
Secure multiparty
Raspberry Pi in a Box
Crypto Stick
SmartCard-HSM
General design principles
So, three options
Cheap high-end HSMS
Cheap low-end HSMS
Remote keys
Layered systems
PirateBay
CloudFlare
Open-source

Reviews

Start your review of Hardware Tamper Resistance - Why and How

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.