1 introduction to computer engineering prof. ramesh karri

26
1 Introduction to Computer Engineering Prof. Ramesh Karri

Upload: alice-bennett

Post on 26-Dec-2015

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Introduction to Computer Engineering Prof. Ramesh Karri

1

Introduction to Computer Engineering

Prof. Ramesh Karri

Page 2: 1 Introduction to Computer Engineering Prof. Ramesh Karri

2

Motivation – HW Security

• Hardware security sneaks into PCs, Robert Lemos, CNET News.com, 3/16/05– trusted computing hardware can lock down

security-sensitive data and applications to a specific computing platform

– Trusted computing group – a consortium of over 70 members https://www.trustedcomputinggroup.org/about/

– TPMs in 8 million pcs in 2004, 20 million pcs in 2005, 95% of all pcs in 2010

Page 3: 1 Introduction to Computer Engineering Prof. Ramesh Karri

3

Motivation – HW Security• Microsoft reveals hardware security plans, concerns

remain, Robert Lemos, SecurityFocus 04/26/05– Detect malicious changes to the computer and protect the

user's data if the laptop is stolen, Secure Startup will combine

– full-volume encryption– Load time integrity checks and – hardware-based Trusted Platform Module (TPM)

• Double edged sword– really heavy handed digital-rights management but – can also be used for some great improvements in security

Page 4: 1 Introduction to Computer Engineering Prof. Ramesh Karri

4

Motivation – HW Security

• Secure Chips for Gadgets Set to Soar, John P. Mello Jr. TechNewsWorld, 05/16/07– early adopters: cable TV industry– next adopters: business sector, where PCs are

being shipped with a secure hardware standard called “Trusted Computing” using a Trusted Platform Module

– The future: mobile handsets and beyond.– By 2013, about 60 million consumer electronic

devices will ship with hardware security– “Nothing is unbreakable”

Page 5: 1 Introduction to Computer Engineering Prof. Ramesh Karri

5

Motivation – HW Security

• Army requires security hardware for all PCs, Cheryl Gerber, FCW.com, 7/31/2006 – A new Army mandate …. will require all Army computers to

have a chip on the motherboard that is dedicated to performing security functions. The …Trusted Platform Module (TPM), will interact with security features … in operating system.

– The differences between TPM and existing security technology are that

• TPM uses standards, • offers a potential for uniformity and • provides the ability to capture the integrity of the platform at a chip

hardware level.

Page 6: 1 Introduction to Computer Engineering Prof. Ramesh Karri

6

Motivation – HW Security• Princeton Professor Finds No Hardware Security

In E-Voting Machine, Antone Gonsalves, InformationWeek, 02/16/07 – Target: a Sequoia AVC Advantage electronic voting machine– Student picks the lock protecting a backdoor to the motherboard in

seven seconds.– Once the door was off, only need to unscrew 10 screws from a

sheet metal panel to get to the computer's circuit boards. • no tamperproofing seals protecting any of the machine's components.

– Reverse engineer program instructions, write your own instructions on a ROM chip

• available from any computer equipment retailer

– pop out the original chip from its socket, and press in the new one

Page 7: 1 Introduction to Computer Engineering Prof. Ramesh Karri

7

Time for smart cards

• By the end of 2006, Westerns European countries have fully migrated to smart cards– Voting: In Sweden you can vote with your smart card, which serves as a non-

repudiation device– Telecommunications: Many cellular phones come with smart cards in Europe

and will soon be shipping in the United States. – Mass Transit: British Air relies on rail and air connections more than most

airports.

• In 2006, ~27M contactless cards were in circulation in US, the number is estimated to top 100M by 2011– E.g., homeland security has required port workers to have smart ID cards

(Jan, 2007) – Entertainment: Most DSS dishes in the U.S. have smart cards.

Page 8: 1 Introduction to Computer Engineering Prof. Ramesh Karri

8/28/2006 8

Smart Cards -- Attacks

• Access Control: Smart Cards Under Attack - Literally, Ken Warren, Security Magazine, 03/17/2006

Page 9: 1 Introduction to Computer Engineering Prof. Ramesh Karri

8/28/2006 9

Smart Cards- Attacks• Keep Your Enemies Close: Distance

Bounding Against Smartcard Relay Attacks, Saar Drimer and Steven J. Murdoch, USENIX SECURITY, 2007

Page 10: 1 Introduction to Computer Engineering Prof. Ramesh Karri

8/28/2006 10

Smart Cards -- Attacks

• Vulnerability Is Discovered In Security for Smart Cards, John Markoff, NY TIMES, 05/13/2002

Page 11: 1 Introduction to Computer Engineering Prof. Ramesh Karri

11

RFIDs

• Many applications in securing transactions, – Inventory Control Container / Pallet Tracking

– ID Badges and Access Control

– Fleet Maintenance Equipment/Personnel Tracking in Hospitals

– Parking Lot Access and Control

– Car Tracking in Rental Lots

– Product Tracking through Manufacturing and Assembly

• Can we create security mechanisms light enough to be suitable for the RFIDs?

Page 12: 1 Introduction to Computer Engineering Prof. Ramesh Karri

12

Shift in the IC Industry’s Business Model

Vertical - one company

Synthesis

Fabrication

HDL

Place

Route

Horizontal (Dominant) – Two or more companies

FabricationEconomy of scale:The same fabrication facility serves many fabless companies

HDL Synthesis Placement Routing

Page 13: 1 Introduction to Computer Engineering Prof. Ramesh Karri

13

Microelectronic Industry Business Model

Page 14: 1 Introduction to Computer Engineering Prof. Ramesh Karri

14

Leading-Edge Technology

• The cost of building a full-scale, 300 mm wafer 65nm process chip fabrication plant is about $3bn

Page 15: 1 Introduction to Computer Engineering Prof. Ramesh Karri

T

DD

F

UU

U

Background: IC design process

D: Design, F: FabricationT: Test, U: User

Page 16: 1 Introduction to Computer Engineering Prof. Ramesh Karri

Rev. engineering

T

DD

F

UU

U

Reverse engineering

D: Design, F: FabricationT: Test, U: User

Page 17: 1 Introduction to Computer Engineering Prof. Ramesh Karri

3500 counterfeit Cisco networking components recovered • estimated retail value ~ $3.5 million

Page 18: 1 Introduction to Computer Engineering Prof. Ramesh Karri

cloningT

DD

F

UU

U

Cloning

D: Design, F: FabricationT: Test, U: User

Page 19: 1 Introduction to Computer Engineering Prof. Ramesh Karri

Trojans

T

DD

F

UU

U

Hardware Trojans

D: Design, F: FabricationT: Test, U: User

Page 20: 1 Introduction to Computer Engineering Prof. Ramesh Karri

The kill switch ?

IEEE Spectrum, 2008

Page 21: 1 Introduction to Computer Engineering Prof. Ramesh Karri

Only 2% of ~$3.5 billion of DoD ICs manufactured intrusted foundries !!!

Page 22: 1 Introduction to Computer Engineering Prof. Ramesh Karri

22

Piracy – Some True Stories…The Chinese Faker

• In 2000, Chen Jin, finished Ph.D. in computer engineering at UT Austin

• He went back to China, first to Motorola research and then to Jiaotong University as a faculty

• In 2003, he supervised a team that created one of China's first homegrown DSP IC

• Chen was named one of China’s brightest young scientists, funded his own lab, got a huge grant from the government

• In 2006, it was revealed that he faked the chip, stealing the design from Texas Instruments!

Page 23: 1 Introduction to Computer Engineering Prof. Ramesh Karri

23

The Athens Affair

• In Mar 8, 2005, Costas Tsalikidis, a 38-year-old Engineer working for Vodafone Greece was linked to the scandal!

• The next day, the prime minister got notified that his cell phone – and those of many other high-rank officials – were hacked!

• Earlier in Jan, investigators had found rogue software installed on the Vodafone Greece by parties unknown

• The scheme did not depend on the wireless nature• A breach in keeping keys in a file – Vodafone was

fined €76 million December 2006!

Page 24: 1 Introduction to Computer Engineering Prof. Ramesh Karri

24

Page 25: 1 Introduction to Computer Engineering Prof. Ramesh Karri

25

Some Basic Definitions

• Intellectual property represents the property of your mind or intellect - proprietary knowledge

• The four legally defined forms of IP– Patents When you register your invention with the

government, you gain the legal right to exclude anyone else from manufacturing or marketing it

– Trademarks A trademark is a name, phrase, sound or symbol used in association with services or products

– Copyrights Copyright laws protect written or artistic expressions fixed in a tangible medium

– Trade secrets A formula, pattern, device or compilation of data that grants the user an advantage over competitors

Page 26: 1 Introduction to Computer Engineering Prof. Ramesh Karri

26

Some Basic Definitions (Cont’d)

• Cryptography: – crypto (secret) + graph (writing)

– the science of locks and keys

– The keys and locks are mathematical

– Underlying every security mechanism, there is a “secret”…

– So the locks and keys are very useful in security

– We are going to talk some about the traditional crypto, but we will also show new forms of security based on other forms of HW-based secrets