Secure Processor Microarchitecture
Chester Rebeiro
The Computing Stack
Transistors and Gates
Microarchitecture
Hypervisor
Operating System
Applications
The good and the bad of hardware in security
Transistors and Gates
Microarchitecture
Hypervisor
Operating System
Applications
The Good
A single bit can enhance security�of the entire system.
Very difficult to bypass
eg. Virtual memory, protection
rings
The Bad
New cybersecurity threats that
are very difficult to detect.
eg. can break most crypto-algorithms�within a few minutes
Range of applications on computer systems
threats differ solutions differ
Syllabus
| Hardware based threats | Hardware based security measures |
Embedded Devices |
|
|
High-performance computing devices |
|
|
Schedule
Evaluation
Logistics
QR Code for Microsoft Teams