Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hardware - A Double-Edged Sword for Security

USENIX Enigma Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course explores the dual nature of hardware as both a security asset and a vulnerability in systems. The learning outcomes include understanding system-level threats addressed by hardware architectures, recognizing how hardware features can leave systems vulnerable, and gaining insight into methodologies and solutions for detecting and preventing hardware vulnerabilities. The course teaches essential hardware considerations for security, the importance of aligning security across stakeholders, and the challenges in hardware security development. The intended audience includes chip vendors, system designers, security professionals, and individuals interested in hardware security.

Syllabus

Tortuga Logic
Hardware Essential to Consider in the context of Security
Hardware as a Trust Anchor
Security Analysis Must Consider Entire System • Vulnerabilities hide in design complexity and interactions between different system components
Example: Flawed Root of Trust Design
Hardware is Highly Configurable
Example: Default Hardware Configuration is Insecure
Example: Secure Debug Configuration Inconvenient
Security Requires Alignment Across Many Stakeholders
Example: Dynamic Voltage and Frequency Scaling
Example: Speculative and Out-of-Order Execution
Industry-Wide Hardware Security Initiatives . Challenge: Security requires alignment between stakeholders in the hardware ecosystem which span multiple companies and countries
Hardware Security Development Lifecycle (HSDL)
Hardware Information Flow Analysis (IFA) • Challenge: Security specification and verification requires time and resources . Using tools where information flow is a first-class concept streamlines both the specification and verification of confidentiality and integrity requirements
Requirements for Secure Hardware
Hardware is a Double-Edged Sword We All Wield Together • IP Providers and SoC Vendors

Taught by

USENIX Enigma Conference

Reviews

Start your review of Hardware - A Double-Edged Sword for Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.