1 introduction to computer engineering prof. ramesh karri
TRANSCRIPT
1
Introduction to Computer Engineering
Prof. Ramesh Karri
2
Motivation – HW Security
• Hardware security sneaks into PCs, Robert Lemos, CNET News.com, 3/16/05– trusted computing hardware can lock down
security-sensitive data and applications to a specific computing platform
– Trusted computing group – a consortium of over 70 members https://www.trustedcomputinggroup.org/about/
– TPMs in 8 million pcs in 2004, 20 million pcs in 2005, 95% of all pcs in 2010
3
Motivation – HW Security• Microsoft reveals hardware security plans, concerns
remain, Robert Lemos, SecurityFocus 04/26/05– Detect malicious changes to the computer and protect the
user's data if the laptop is stolen, Secure Startup will combine
– full-volume encryption– Load time integrity checks and – hardware-based Trusted Platform Module (TPM)
• Double edged sword– really heavy handed digital-rights management but – can also be used for some great improvements in security
4
Motivation – HW Security
• Secure Chips for Gadgets Set to Soar, John P. Mello Jr. TechNewsWorld, 05/16/07– early adopters: cable TV industry– next adopters: business sector, where PCs are
being shipped with a secure hardware standard called “Trusted Computing” using a Trusted Platform Module
– The future: mobile handsets and beyond.– By 2013, about 60 million consumer electronic
devices will ship with hardware security– “Nothing is unbreakable”
5
Motivation – HW Security
• Army requires security hardware for all PCs, Cheryl Gerber, FCW.com, 7/31/2006 – A new Army mandate …. will require all Army computers to
have a chip on the motherboard that is dedicated to performing security functions. The …Trusted Platform Module (TPM), will interact with security features … in operating system.
– The differences between TPM and existing security technology are that
• TPM uses standards, • offers a potential for uniformity and • provides the ability to capture the integrity of the platform at a chip
hardware level.
6
Motivation – HW Security• Princeton Professor Finds No Hardware Security
In E-Voting Machine, Antone Gonsalves, InformationWeek, 02/16/07 – Target: a Sequoia AVC Advantage electronic voting machine– Student picks the lock protecting a backdoor to the motherboard in
seven seconds.– Once the door was off, only need to unscrew 10 screws from a
sheet metal panel to get to the computer's circuit boards. • no tamperproofing seals protecting any of the machine's components.
– Reverse engineer program instructions, write your own instructions on a ROM chip
• available from any computer equipment retailer
– pop out the original chip from its socket, and press in the new one
7
Time for smart cards
• By the end of 2006, Westerns European countries have fully migrated to smart cards– Voting: In Sweden you can vote with your smart card, which serves as a non-
repudiation device– Telecommunications: Many cellular phones come with smart cards in Europe
and will soon be shipping in the United States. – Mass Transit: British Air relies on rail and air connections more than most
airports.
• In 2006, ~27M contactless cards were in circulation in US, the number is estimated to top 100M by 2011– E.g., homeland security has required port workers to have smart ID cards
(Jan, 2007) – Entertainment: Most DSS dishes in the U.S. have smart cards.
8/28/2006 8
Smart Cards -- Attacks
• Access Control: Smart Cards Under Attack - Literally, Ken Warren, Security Magazine, 03/17/2006
8/28/2006 9
Smart Cards- Attacks• Keep Your Enemies Close: Distance
Bounding Against Smartcard Relay Attacks, Saar Drimer and Steven J. Murdoch, USENIX SECURITY, 2007
8/28/2006 10
Smart Cards -- Attacks
• Vulnerability Is Discovered In Security for Smart Cards, John Markoff, NY TIMES, 05/13/2002
11
RFIDs
• Many applications in securing transactions, – Inventory Control Container / Pallet Tracking
– ID Badges and Access Control
– Fleet Maintenance Equipment/Personnel Tracking in Hospitals
– Parking Lot Access and Control
– Car Tracking in Rental Lots
– Product Tracking through Manufacturing and Assembly
• Can we create security mechanisms light enough to be suitable for the RFIDs?
12
Shift in the IC Industry’s Business Model
Vertical - one company
Synthesis
Fabrication
HDL
Place
Route
Horizontal (Dominant) – Two or more companies
FabricationEconomy of scale:The same fabrication facility serves many fabless companies
HDL Synthesis Placement Routing
13
Microelectronic Industry Business Model
14
Leading-Edge Technology
• The cost of building a full-scale, 300 mm wafer 65nm process chip fabrication plant is about $3bn
T
DD
F
UU
U
Background: IC design process
D: Design, F: FabricationT: Test, U: User
Rev. engineering
T
DD
F
UU
U
Reverse engineering
D: Design, F: FabricationT: Test, U: User
3500 counterfeit Cisco networking components recovered • estimated retail value ~ $3.5 million
cloningT
DD
F
UU
U
Cloning
D: Design, F: FabricationT: Test, U: User
Trojans
T
DD
F
UU
U
Hardware Trojans
D: Design, F: FabricationT: Test, U: User
The kill switch ?
IEEE Spectrum, 2008
Only 2% of ~$3.5 billion of DoD ICs manufactured intrusted foundries !!!
22
Piracy – Some True Stories…The Chinese Faker
• In 2000, Chen Jin, finished Ph.D. in computer engineering at UT Austin
• He went back to China, first to Motorola research and then to Jiaotong University as a faculty
• In 2003, he supervised a team that created one of China's first homegrown DSP IC
• Chen was named one of China’s brightest young scientists, funded his own lab, got a huge grant from the government
• In 2006, it was revealed that he faked the chip, stealing the design from Texas Instruments!
23
The Athens Affair
• In Mar 8, 2005, Costas Tsalikidis, a 38-year-old Engineer working for Vodafone Greece was linked to the scandal!
• The next day, the prime minister got notified that his cell phone – and those of many other high-rank officials – were hacked!
• Earlier in Jan, investigators had found rogue software installed on the Vodafone Greece by parties unknown
• The scheme did not depend on the wireless nature• A breach in keeping keys in a file – Vodafone was
fined €76 million December 2006!
24
25
Some Basic Definitions
• Intellectual property represents the property of your mind or intellect - proprietary knowledge
• The four legally defined forms of IP– Patents When you register your invention with the
government, you gain the legal right to exclude anyone else from manufacturing or marketing it
– Trademarks A trademark is a name, phrase, sound or symbol used in association with services or products
– Copyrights Copyright laws protect written or artistic expressions fixed in a tangible medium
– Trade secrets A formula, pattern, device or compilation of data that grants the user an advantage over competitors
26
Some Basic Definitions (Cont’d)
• Cryptography: – crypto (secret) + graph (writing)
– the science of locks and keys
– The keys and locks are mathematical
– Underlying every security mechanism, there is a “secret”…
– So the locks and keys are very useful in security
– We are going to talk some about the traditional crypto, but we will also show new forms of security based on other forms of HW-based secrets