1 of 9

Secure Processor Microarchitecture

Chester Rebeiro

2 of 9

The Computing Stack

Transistors and Gates

Microarchitecture

Hypervisor

Operating System

Applications

3 of 9

The good and the bad of hardware in security

Transistors and Gates

Microarchitecture

Hypervisor

Operating System

Applications

The Good

A single bit can enhance security�of the entire system.

Very difficult to bypass

eg. Virtual memory, protection

rings

The Bad

New cybersecurity threats that

are very difficult to detect.

eg. can break most crypto-algorithms�within a few minutes

4 of 9

Range of applications on computer systems

threats differ solutions differ

5 of 9

Syllabus

Hardware based threats

Hardware based security measures

Embedded Devices

  • Side-channel attacks
  • Fault injection attacks
  • Hardware based attacks
  • Secure boot / update
  • Physically unclonable functions
  • Trustzone / Keystone��(ARM / RISC V based solutions)

High-performance computing devices

  • Micro-architectural attacks
  • Intel SGX
  • Memory encryption
  • Malware detection with hardware

  • (Intel / AMD based solutions)

6 of 9

Schedule

  • Introduction
  • Computer Security and Applied Cryptography
  • Threats on Embedded Devices
  • Threats on High-performance devices
  • Hardware based protection schemes for embedded devices
  • Hardware based protection schemes for high-performance devices

7 of 9

Evaluation

  • Mid Sem Exam (30%)
  • End Sem Exam (30%)
  • Lab Assignments (40%)

8 of 9

Logistics

  • Offline classes: will be in CRC301 and online streaming.�

  • C Slot:
    • M: 10:00 to 10:50AM
    • Tu: 9:00 to 9:50AM
    • W: 8:00 to 8:50AM
    • Fri: 12:00 to 12:50PM (used of assignments)

  • All communication will be through Microsoft Teams channels�
  • Exams and quizzes will be done offline�
  • Attendance as per Institute rules�

9 of 9

QR Code for Microsoft Teams