Computer Architecture and Security

Total Page:16

File Type:pdf, Size:1020Kb

Computer Architecture and Security RED BOX RULES ARE FOR PROOF STAGE ONLY. DELETE BEFORE FINAL PRINTING. 20mm PPC FINAL ARTWORK Wang Computer Architecture Ledley and Security Computer Architecture and Architecture Computer Fundamentals of Designing Secure Computer Systems Shuangbao (Paul) Wang, George Mason University, USA WILEY-HEP INFORMATION SECURITY SERIES Robert S. Ledley, Georgetown University, USA In today’s workplace, computer and information security professionals must understand both hardware and software to deploy effective security solutions. Computer Architecture and Security covers a wide range of computer and network hardware, system software, information and data concepts from a security perspective, providing readers with Computer solutions and tools to implement secure computer and information systems. Featuring a careful, in-depth, and innovative introduction to modern computer systems and patent- pending technologies in computer security, the text integrates design considerations with hands-on experiences to help practitioners to render systems immune from attacks. Architecture Examination of memory, CPU architecture and system implementation and Security Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Includes the latest patent-pending technologies in architecture security Fundamentals of Placement of computers in a security fulfilled network environment Designing Secure Co-authored by the inventor of the modern Computed Tomography (CT) scanner Security Provides Companion Website with lecture notes, security tools and latest updates Computer Systems This book is geared for graduate students in computer architecture, communications, Shuangbao (Paul) Wang and information security, as well as engineers, researchers, security professionals, and middleware designers. Robert S. Ledley www.wiley.com/go/wang/comp_arch Cover design: Cylinder COMPUTER ARCHITECTURE AND SECURITY Information Security Series The Wiley-HEP Information Security Series systematically introduces the fundamentals of information security design and application. The goals of the Series are: to provide fundamental and emerging theories and techniques to stimulate more research in cryptol- ogy, algorithms, protocols, and architectures; to inspire professionals to understand the issues behind important security problems and the ideas behind the solutions; to give references and suggestions for additional reading and further study. The Series is a joint project between Wiley and Higher Education Press (HEP) of China. Publications consist of advanced textbooks for graduate students as well as researcher and practitioner references covering the key areas, including but not limited to: – Modern Cryptography – Cryptographic Protocols and Network Security Protocols – Computer Architecture and Security – Database Security – Multimedia Security – Computer Forensics – Intrusion Detection Lead Editors Songyuan Yan London, UK Moti Yung Columbia University, USA John Rief Duke University, USA Editorial Board Liz Bacon University of Greenwich, UK Kefei Chen Shanghai Jiaotong University, China Matthew Franklin University of California, USA Dieter Gollmann Hamburg University of Technology, Germany Yongfei Han Beijing University of Technology, China ONETS Wireless & Internet Security Tech. Co., Ltd. Singapore Kwangjo Kim KAIST-ICC, Korea David Naccache Ecole Normale Superieure, France Dingyi Pei Guangzhou University, China Peter Wild University of London, UK COMPUTER ARCHITECTURE AND SECURITY FUNDAMENTALS OF DESIGNING SECURE COMPUTER SYSTEMS Shuangbao (Paul) Wang George Mason University, USA Robert S. Ledley Georgetown University, USA This edition first published 2013 # 2013 Higher Education Press. All rights reserved. Published by John Wiley & Sons Singapore Pte. Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628, under exclusive license by Higher Education Press in all media and all languages throughout the world excluding Mainland China and excluding Simplified and Traditional Chinese languages. For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse th e copyright material in this book please see our website at www.wiley.com. All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as expressly permitted by law, without either the prior written permission of the Publisher, or authorization through payment of the appropriate photocopy fee to the Copyright Clearance Center. Requests for permission should be addressed to the Publisher, John Wiley & Sons Singapore Pte. Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628, tel: 65-66438000, fax: 65-66438008, email: [email protected]. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The Publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Library of Congress Cataloging-in-Publication Data Computer architecture and security : fundamentals of designing secure computer systems / Shuangbao (Paul) Wang, Robert S. Ledley. p. cm. Includes bibliographical references and index. ISBN 978-1-118-16881-3 (cloth) 1. Computer architecture. 2. Computer security. 3. System design. I. Wang, Shuangbao Paul. II. Ledley, Robert Steven. QA76.9.A73C6293 2012 005.8–dc23 2012027837 ISBN: 9781118168813 Set in 11/13 pt Times by Thomson Digital, Noida, India To our parents who care and educate us throughout our journey. In memory of Dr. Ledley, who pioneered Biomedical Computing. Contents About the Authors xv Preface xvii Acknowledgements xix 1 Introduction to Computer Architecture and Security 1 1.1 History of Computer Systems 3 1.1.1 Timeline of Computer History 5 1.1.2 Timeline of Internet History 15 1.1.3 Timeline of Computer Security History 28 1.2 John von Neumann Computer Architecture 34 1.3 Memory and Storage 36 1.4 Input/Output and Network Interface 37 1.5 Single CPU and Multiple CPU Systems 38 1.6 Overview of Computer Security 41 1.6.1 Confidentiality 41 1.6.2 Integrity 42 1.6.3 Availability 42 1.6.4 Threats 43 1.6.5 Firewalls 43 1.6.6 Hacking and Attacks 44 1.7 Security Problems in Neumann Architecture 46 1.8 Summary 48 Exercises 48 References 50 2 Digital Logic Design 51 2.1 Concept of Logic Unit 51 2.2 Logic Functions and Truth Tables 52 2.3 Boolean Algebra 54 2.4 Logic Circuit Design Process 55 viii Contents 2.5 Gates and Flip-Flops 56 2.6 Hardware Security 58 2.7 FPGA and VLSI 58 2.7.1 Design of an FPGA Biometric Security System 59 2.7.2 A RIFD Student Attendance System 59 2.8 Summary 65 Exercises 67 References 67 3 Computer Memory and Storage 68 3.1 A One Bit Memory Circuit 68 3.2 Register, MAR, MDR and Main Memory 70 3.3 Cache Memory 72 3.4 Virtual Memory 74 3.4.1 Paged Virtual Memoryà 75 3.4.2 Segmented Virtual Memoryà 75 3.5 Non-Volatile Memory 76 3.6 External Memory 77 3.6.1 Hard Disk Drives 78 3.6.2 Tertiary Storage and Off-Line Storageà 78 3.6.3 Serial Advanced Technology Attachment (SATA) 79 3.6.4 Small Computer System Interface (SCSI) 80 3.6.5 Serial Attached SCSI (SAS) 81 3.6.6 Network-Attached Storage (NAS)à 82 3.6.7 Storage Area Network (SAN)à 83 3.6.8 Cloud Storage 85 3.7 Memory Access Security 86 3.8 Summary 88 Exercises 89 References 89 4 Bus and Interconnection 90 4.1 System Bus 90 4.1.1 Address Bus 91 4.1.2 Data Bus 93 4.1.3 Control Bus 93 4.2 Parallel Bus and Serial Bus 95 4.2.1 Parallel Buses and Parallel Communication 95 4.2.2 Serial Bus and Serial Communication 96 4.3 Synchronous Bus and Asynchronous Bus 107 à The star “Ô here means the content is a little bit more advanced. For teaching purpose, this content may be omitted for entry level students. Contents ix 4.4 Single Bus and Multiple Buses 109 4.5 Interconnection Buses 110 4.6 Security Considerations for Computer Buses 111 4.7 A Dual-Bus Interface Design 112 4.7.1 Dual-Channel Architectureà 113 4.7.2 Triple-Channel Architectureà 114 4.7.3 A Dual-Bus Memory Interface 115 4.8 Summary 115 Exercises 117 References 117 5 I/O and Network Interface 118 5.1 Direct Memory Access 118 5.2 Interrupts 120 5.3 Programmed I/O 121 5.4 USB and IEEE 1394 122 5.4.1 USB Advantages 123 5.4.2 USB Architecture 123 5.4.3 USB Version History 124 5.4.4 USB Design and Architectureà 125 5.4.5 USB Mass Storage 127 5.4.6 USB Interface Connectors 128 5.4.7 USB Connector Types 130 5.4.8 USB Power and Charging 133 5.4.9 IEEE 1394 136 5.5 Network Interface Card 136 5.5.1 Basic NIC Architecture 137 5.5.2 Data Transmission 138 5.6 Keyboard, Video and Mouse (KVM) Interfaces 139 5.6.1 Keyboards 140 5.6.2 Video Graphic Card 140 5.6.3 Mouses 140 5.7 Input/Output Security 140 5.7.1 Disable Certain Key Combinations 141 5.7.2 Anti-Glare Displays 141 5.7.3 Adding Password to Printer
Recommended publications
  • Early Stored Program Computers
    Stored Program Computers Thomas J. Bergin Computing History Museum American University 7/9/2012 1 Early Thoughts about Stored Programming • January 1944 Moore School team thinks of better ways to do things; leverages delay line memories from War research • September 1944 John von Neumann visits project – Goldstine’s meeting at Aberdeen Train Station • October 1944 Army extends the ENIAC contract research on EDVAC stored-program concept • Spring 1945 ENIAC working well • June 1945 First Draft of a Report on the EDVAC 7/9/2012 2 First Draft Report (June 1945) • John von Neumann prepares (?) a report on the EDVAC which identifies how the machine could be programmed (unfinished very rough draft) – academic: publish for the good of science – engineers: patents, patents, patents • von Neumann never repudiates the myth that he wrote it; most members of the ENIAC team contribute ideas; Goldstine note about “bashing” summer7/9/2012 letters together 3 • 1.0 Definitions – The considerations which follow deal with the structure of a very high speed automatic digital computing system, and in particular with its logical control…. – The instructions which govern this operation must be given to the device in absolutely exhaustive detail. They include all numerical information which is required to solve the problem…. – Once these instructions are given to the device, it must be be able to carry them out completely and without any need for further intelligent human intervention…. • 2.0 Main Subdivision of the System – First: since the device is a computor, it will have to perform the elementary operations of arithmetics…. – Second: the logical control of the device is the proper sequencing of its operations (by…a control organ.
    [Show full text]
  • P the Pioneers and Their Computers
    The Videotape Sources: The Pioneers and their Computers • Lectures at The Compp,uter Museum, Marlboro, MA, September 1979-1983 • Goal: Capture data at the source • The first 4: Atanasoff (ABC), Zuse, Hopper (IBM/Harvard), Grosch (IBM), Stibitz (BTL) • Flowers (Colossus) • ENIAC: Eckert, Mauchley, Burks • Wilkes (EDSAC … LEO), Edwards (Manchester), Wilkinson (NPL ACE), Huskey (SWAC), Rajchman (IAS), Forrester (MIT) What did it feel like then? • What were th e comput ers? • Why did their inventors build them? • What materials (technology) did they build from? • What were their speed and memory size specs? • How did they work? • How were they used or programmed? • What were they used for? • What did each contribute to future computing? • What were the by-products? and alumni/ae? The “classic” five boxes of a stored ppgrogram dig ital comp uter Memory M Central Input Output Control I O CC Central Arithmetic CA How was programming done before programming languages and O/Ss? • ENIAC was programmed by routing control pulse cables f ormi ng th e “ program count er” • Clippinger and von Neumann made “function codes” for the tables of ENIAC • Kilburn at Manchester ran the first 17 word program • Wilkes, Wheeler, and Gill wrote the first book on programmiidbBbbIiSiing, reprinted by Babbage Institute Series • Parallel versus Serial • Pre-programming languages and operating systems • Big idea: compatibility for program investment – EDSAC was transferred to Leo – The IAS Computers built at Universities Time Line of First Computers Year 1935 1940 1945 1950 1955 ••••• BTL ---------o o o o Zuse ----------------o Atanasoff ------------------o IBM ASCC,SSEC ------------o-----------o >CPC ENIAC ?--------------o EDVAC s------------------o UNIVAC I IAS --?s------------o Colossus -------?---?----o Manchester ?--------o ?>Ferranti EDSAC ?-----------o ?>Leo ACE ?--------------o ?>DEUCE Whirl wi nd SEAC & SWAC ENIAC Project Time Line & Descendants IBM 701, Philco S2000, ERA..
    [Show full text]
  • TCM Report, Winter
    Contents THE COMPUTER MUSEUM BOARD OF DIRECTORS I The Director's Letter The Computer Museum is a non-profit. Kenneth H. Olsen. Chairman public. charitable foundation dedicated to Diglfai Equipment Corporation 2 Computers: A Look At The First preserving and exhibiting an industry-wide. Charles W. Bachman. Generation broad-based collection of the history of in­ formation processing. Computer history is Chairman. Executive Committee 8 The Core Process interpreted through exhibits. publications. Bachman information Systems 10 Alan J. Perlis Lecture: Evolution videotapes. lectures. educational programs. C. Gordon Bell and other programs. The Museum archives Encore Computer Corporation of Software Programming both artifacts and documentation and 13 Bits and Bites makes the materials available for Gwen Bell scholarly use. The Computer Museum 14 Member Tour Museum membership is available to Erich Bloch 15 Yard Sale individuals and non-profit organizations International Business Machines Member Coupon for $25 annually and to businesses for $125 Harvey D. Cragon annually. Members receive the quarterly Texas Instruments 16 The Computer Museum Slides Report. invitations to all lectures and spe­ 1984 Computer Era Calendar cial programs. new posters. and a ten David Donaldson percent discount in the Museum store. Ropes and Grey 17 Founders A Founders program is in effect during the Robert Everett The End Bit initial two-year period of the Museum. until The MITRE Corporation June 10. 1984. During this period individuals and non-profit organizations may become Sydney Fernbach Founders for $250 and businesses and chari­ Computer Consultant table Foundations may become Founders for C . Lester Hogan $2500. Founders receive all benefits of mem­ Fairchild Camera and Instrument Corporation bership and recognition for their important role in establishing the Museum.
    [Show full text]
  • History in the Computing Curriculum
    R e p o r t History in the Computing Curriculum I F I P TC 3 / TC 9 Joint Task Group John Impagliazzo (Task Group Chair) Hofstra University Martin Campbell-Kelly University of Warwick Gordon Davies Open University John A. N. Lee Virginia Tech Michael R. Williams University of Calgary Prepublication Copy 1998 October Copyright © 1998, 1999 Institute of Electrical and Electronics Engineers. This report is scheduled to appear in an upcoming issue of the Annals of the History of Computing. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by sending an email request to <[email protected]>. HISTORY IN THE COMPUTING CURRICULUM Prepublication Copy 1998 October CONTENTS 1. INTRODUCTION 9. RESOURCES 9.1 Textbooks and General Works 2. GOALS AND OBJECTIVES 9.2 Monographs and Articles 9.3 Electronic Information 3. OVERVIEW OF THIS REPORT 9.4 Videos, Simulators, and Other Resources 4. BACKGROUND 10. EXTENDED TOPICS 4.1 Overview of Curriculum Recommendations 10.1 Advanced Courses 4.2 History Status 10.2 Projects 5. NEED FOR HISTORY CONTENT 11. CONCLUSIONS 5.1 The Student Perspective 5.2 The Professional Perspective 12. FUTURE DEVELOPMENTS 6. CURRICULUM CONTENT 6.1 Establishing a Knowledge Base ACKNOWLEDGMENTS 6.2 Methods of Presentation 6.2.1 The Period Method REFERENCES 6.2.2 Other Methods 6.3 Depth of Knowledge PUBLIC ACCESS 6.4 Clusters APPENDIX 7. IMPLEMENTATION OF A BASIC CURRICULUM A.
    [Show full text]
  • Computer Oral History Collection, 1969-1973, 1977
    Computer Oral History Collection, 1969-1973, 1977 Interviewee: Harry Huskey and Mrs. Huskey Interviewer: Bobbi Mapstone Date: April 19, 1973 Repository: Archives Center, National Museum of American History MAPSTONE: The date is April 19, 1973, This is Bobbi Mapstone and I'm talking to Professor Huskey and Mrs. Huskey at their home in Santa Cruz, California on April 19, 1973. Perhaps we could start with your joining the Institute of Numerical Analysis, what your position was, and discuss the charter of the Institute and how it influenced computing and people. HUSKEY: I think the Charter of the Institute was to foster work in computational mathematics, with the idea that with the new computing machines one could do things that were more interesting, more significant and that you weren't able to do before with desk calculators. There was a research program there, and over the years most of the famous men in analysis have spent time there. For example, Hartree was there for awhile, in fact, he was Director; Barkley Rosser was there; Mark Katz. I guess we have named some of them previously; Rutishauser was there from Switzerland; and from Oregon was there--he was one of the early people in the innovation of differential equations; there was a whole host of names. That indicates the primary function of the Institute. In order to move that kind of research along and to make sure that it had some relationship to computers, the idea was to have a high-speed computer. Originally it was expected this would be purchased from some vendor, and the Bureau had money from the Air Force to do this sort of thing.
    [Show full text]
  • COMPUTER ARCHITECTURE and SECURITY Information Security Series
    COMPUTER ARCHITECTURE AND SECURITY Information Security Series The Wiley-HEP Information Security Series systematically introduces the fundamentals of information security design and application. The goals of the Series are: to provide fundamental and emerging theories and techniques to stimulate more research in cryptol- ogy, algorithms, protocols, and architectures; to inspire professionals to understand the issues behind important security problems and the ideas behind the solutions; to give references and suggestions for additional reading and further study. The Series is a joint project between Wiley and Higher Education Press (HEP) of China. Publications consist of advanced textbooks for graduate students as well as researcher and practitioner references covering the key areas, including but not limited to: – Modern Cryptography – Cryptographic Protocols and Network Security Protocols – Computer Architecture and Security – Database Security – Multimedia Security – Computer Forensics – Intrusion Detection Lead Editors Songyuan Yan London, UK Moti Yung Columbia University, USA John Rief Duke University, USA Editorial Board Liz Bacon University of Greenwich, UK Kefei Chen Shanghai Jiaotong University, China Matthew Franklin University of California, USA Dieter Gollmann Hamburg University of Technology, Germany Yongfei Han Beijing University of Technology, China ONETS Wireless & Internet Security Tech. Co., Ltd. Singapore Kwangjo Kim KAIST-ICC, Korea David Naccache Ecole Normale Superieure, France Dingyi Pei Guangzhou University,
    [Show full text]
  • Notes: 6 Per Page
    Stored Program Computer • RAM • 10 Print “HAL: I know SPC (Stored program computer quote from that you and Frank were Williams p. 302): planning to disconnect me, and I'm afraid • “it must be possible to erase the contents of that's something I the memory and store new data2 [JT: Stored Program Computers And cannot allow to happen”1 program instructions as well] in place of the • 20 If (Dave Bowman) old, then airlock crew • it must be possible to store information for Computer Memories member long periods of time; • it must inexpensive to construct because it would be needed in large quantities; This section includes developments in • it must be possible to get at the information being stored in very short periods of time early memory technologies as well as the Microsoft because there is no point in producing high- clipart speed electronic arithmetic and control units first stored program computers if you cannot get at the instructions and data with the same high speeds).” 1 “2001 Space Odyssey” © Warner Brothers, MGM James Tam James Tam 2 “An important feature of this device [JT: A stored-program computer] was that operating instructions and function tables would be stored exactly in the same sort of memory device as that used for numbers”1 Stored Program Computer? Stored Program Computer? • ABC? • Punch card and punched tape machines? •q w e r t y u i o p Input (decimal) •a s d f g h j k l Arithmetic z x c v b n m (binary) Output (decimal) A photo of Clifford Berry and the ABC, courtesy of Iowa state university Control: data and instructions (35 mm tape) •Capacitors James Tam James Tam Who Came Up With The Concept Of The Stored How Did Machines Receive Their Instructions Program Computer? • Before stored program computers • Why it’s important.
    [Show full text]
  • Military Roots
    CHAPTER THREE Military Roots WHEN historians examine the origins of the electronic digital computer, they usually give top billing to the pioneering efforts of the American scientists J. Presper Eckert and John W. Mauchly, who built their Electronic Numerical Integrator and Computer (ENIAC) during World War II. Eckert and Mauchly are justly and widely honored as the men whose efforts and risks led to the first machines recognizable as modern computers. They also founded the first private computer systems company. But historians now also recognize a lesser known history of the computer, one whose roots run deep into the most sensitive and secret corners of a modern military establishment. It was no accident that the military services largely financed the postwar development of the computer in the 1950s, for computing technology had played a pivotal role in the Allied war effort. The military indirectly bankrolled even the Eckert and Mauchly computer projects, and these relatively open projects were only the tip of a much larger, and sometimes hidden, technological iceberg. The military computer projects, as well as Eckert and Mauchly's daring bet on an as-yet nonexistent commercial market, led to the first stirrings of interest in computers in the 1950s by business and industry. Indeed the first commercial computers were direct copies or adaptations of machines developed for military users. After the war, the commercial potential of government-sponsored research became more apparent. The first great political clashes over technology policy in the United States occurred. Origins of the Computer By the time war broke out in 1939, engineering and science had already made important advances in several seemingly unrelated areas .
    [Show full text]
  • The First Computers—History and Architectures, Edited by Raúl Rojas and Ulf Hashagen, 2000 the First Computers—History and Architectures
    History of Computing I. Bernard Cohen and William Aspray, editors Editorial Board: Bernard Galler, University of Michigan, Ann Arbor, Michigan; J. A. N. Lee, Virginia Polytechnic Institute, Blacksburg, Virginia; Arthur Norberg, Charles Babbage Institute, Minneapolis, Minnesota; Brian Randell, University of Newcastle, Newcastle upon Tyne; Henry Tropp, Humboldt State College, Arcata, California; Michael Williams, University of Calgary, Alberta; Heinz Zemanek, Vienna Memories That Shaped an Industry, Emerson W. Pugh, 1984 The Computer Comes of Age: The People, the Hardware, and the Software, R. Moreau, 1984 Memoirs of a Computer Pioneer, Maurice V. Wilkes, 1985 Ada: A Life and Legacy, Dorothy Stein, 1985 IBM's Early Computers, Charles J. Bashe, Lyle R. Johnson, John H. Palmer, and Emerson W. Pugh, 1986 A Few Good Men from Univac, David E. Lundstrom, 1987 Innovating for Failure: Government Policy and the Early British Computer Industry, John Hendry, 1990 Glory and Failure: The Difference Engines of Johann Müller, Charles Babbage and Georg and Edvard Scheutz, Michael Lindgren, 1990 John von Neumann and the Origins of Modern Computing, William Aspray, 1990 IBM's 360 and Early 370 Systems, Emerson W. Pugh, Lyle R. Johnson, and John H. Palmer, 1991 Building IBM: Shaping an Industry and Its Technology, Emerson W. Pugh, 1995 A History of Modern Computing, Paul Ceruzzi, 1998 Makin 'Numbers: Howard Aiken and the Computer, edited by I. Bernard Cohen and Gregory W. Welch with the cooperation of Robert V. D. Campbell, 1999 Howard Aiken: Portrait of a Computer Pioneer, I. Bernard Cohen, 1999 The First Computers—History and Architectures, edited by Raúl Rojas and Ulf Hashagen, 2000 The First Computers—History and Architectures edited by Raúl Rojas and Ulf Hashagen © 2000 Massachusetts Institute of Technology All rights reserved.
    [Show full text]