EE260 Architecture/Hardware Support for Security

EE260 Architecture/Hardware Support for Security

EE260 Architecture/Hardware Support for Security Nael Abu-Ghazaleh Department of Computer Science and Engineering Department of Electrical and Computer Engineering University of California at Riverside [email protected] September 27, 2018 1 Computer system evolution 2 Growing security and privacy threat What makes malware/attacks possible? So, what exactly is this course about? Course mechanics: what work is required and how will I be graded? Reading (and writing!) papers Overview Why Architecture Support for Security? Two (and a half) stories Sept. 27, 2018 EE260 2 / 21 2 Growing security and privacy threat What makes malware/attacks possible? So, what exactly is this course about? Course mechanics: what work is required and how will I be graded? Reading (and writing!) papers Overview Why Architecture Support for Security? Two (and a half) stories 1 Computer system evolution Sept. 27, 2018 EE260 2 / 21 What makes malware/attacks possible? So, what exactly is this course about? Course mechanics: what work is required and how will I be graded? Reading (and writing!) papers Overview Why Architecture Support for Security? Two (and a half) stories 1 Computer system evolution 2 Growing security and privacy threat Sept. 27, 2018 EE260 2 / 21 So, what exactly is this course about? Course mechanics: what work is required and how will I be graded? Reading (and writing!) papers Overview Why Architecture Support for Security? Two (and a half) stories 1 Computer system evolution 2 Growing security and privacy threat What makes malware/attacks possible? Sept. 27, 2018 EE260 2 / 21 Course mechanics: what work is required and how will I be graded? Reading (and writing!) papers Overview Why Architecture Support for Security? Two (and a half) stories 1 Computer system evolution 2 Growing security and privacy threat What makes malware/attacks possible? So, what exactly is this course about? Sept. 27, 2018 EE260 2 / 21 Reading (and writing!) papers Overview Why Architecture Support for Security? Two (and a half) stories 1 Computer system evolution 2 Growing security and privacy threat What makes malware/attacks possible? So, what exactly is this course about? Course mechanics: what work is required and how will I be graded? Sept. 27, 2018 EE260 2 / 21 Overview Why Architecture Support for Security? Two (and a half) stories 1 Computer system evolution 2 Growing security and privacy threat What makes malware/attacks possible? So, what exactly is this course about? Course mechanics: what work is required and how will I be graded? Reading (and writing!) papers Sept. 27, 2018 EE260 2 / 21 Dennard's scaling made Moore's Law useful. Device or Circuit Parameter Scaling factor Device dimension, tox ; L; W 1/κ Voltage, Current 1/κ Capacitance 1/κ Delay 1/κ Power 1/κ2 Power Density 1 Unfortunately, Dennard's scaling stopped. Power wall is here. Trend 1: Architecture and Systems Moore's Law still with us for a while (transistor count increasing) More cores? Sept. 27, 2018 EE260 3 / 21 Unfortunately, Dennard's scaling stopped. Power wall is here. Trend 1: Architecture and Systems Moore's Law still with us for a while (transistor count increasing) More cores? Dennard's scaling made Moore's Law useful. Device or Circuit Parameter Scaling factor Device dimension, tox ; L; W 1/κ Voltage, Current 1/κ Capacitance 1/κ Delay 1/κ Power 1/κ2 Power Density 1 Sept. 27, 2018 EE260 3 / 21 Trend 1: Architecture and Systems Moore's Law still with us for a while (transistor count increasing) More cores? Dennard's scaling made Moore's Law useful. Device or Circuit Parameter Scaling factor Device dimension, tox ; L; W 1/κ Voltage, Current 1/κ Capacitance 1/κ Delay 1/κ Power 1/κ2 Power Density 1 Unfortunately, Dennard's scaling stopped. Power wall is here. Sept. 27, 2018 EE260 3 / 21 Transistor count still increasing Sept. 27, 2018 EE260 4 / 21 Power Wall Sept. 27, 2018 EE260 5 / 21 Power Wall (2) Sept. 27, 2018 EE260 6 / 21 Agressive power management needed: power=performance Specialized cores, turned on to match applications What to support in hardware? \To achieve long battery life when playing video, mobile devices must decode the video in hardware; decoding it in software uses too much power." { Apple on Flash Innovation needed (not just in architecture{the whole system stack) Implications{What to do with all the transistors? Dark Silicon: at 8nm, only half the chip can be active at a time Sept. 27, 2018 EE260 7 / 21 Specialized cores, turned on to match applications What to support in hardware? \To achieve long battery life when playing video, mobile devices must decode the video in hardware; decoding it in software uses too much power." { Apple on Flash Innovation needed (not just in architecture{the whole system stack) Implications{What to do with all the transistors? Dark Silicon: at 8nm, only half the chip can be active at a time Agressive power management needed: power=performance Sept. 27, 2018 EE260 7 / 21 What to support in hardware? \To achieve long battery life when playing video, mobile devices must decode the video in hardware; decoding it in software uses too much power." { Apple on Flash Innovation needed (not just in architecture{the whole system stack) Implications{What to do with all the transistors? Dark Silicon: at 8nm, only half the chip can be active at a time Agressive power management needed: power=performance Specialized cores, turned on to match applications Sept. 27, 2018 EE260 7 / 21 Innovation needed (not just in architecture{the whole system stack) Implications{What to do with all the transistors? Dark Silicon: at 8nm, only half the chip can be active at a time Agressive power management needed: power=performance Specialized cores, turned on to match applications What to support in hardware? \To achieve long battery life when playing video, mobile devices must decode the video in hardware; decoding it in software uses too much power." { Apple on Flash Sept. 27, 2018 EE260 7 / 21 Implications{What to do with all the transistors? Dark Silicon: at 8nm, only half the chip can be active at a time Agressive power management needed: power=performance Specialized cores, turned on to match applications What to support in hardware? \To achieve long battery life when playing video, mobile devices must decode the video in hardware; decoding it in software uses too much power." { Apple on Flash Innovation needed (not just in architecture{the whole system stack) Sept. 27, 2018 EE260 7 / 21 CPU manufacturers investing in security Trusted Platform Module (TPM) No Execute bit (NX-bit) Supervisor Mode Execution/Access Prevention (SMEP/SMAP) AES Encryption Extensions SHA Hash Extensions MPX: Memory Protection Extensions SGX {Software Guard Extensions (Isolated Execution) IPT {Identity Protection Technology ARM Trustzone; Amazon CloudHSM ... Systems are changing Rapid evolution in systems creating new tussle spaces Cloud computing, smart devices, smart grids, national infrastructure New security and privacy concerns New threat models and novel attacks Sept. 27, 2018 EE260 8 / 21 Systems are changing Rapid evolution in systems creating new tussle spaces Cloud computing, smart devices, smart grids, national infrastructure New security and privacy concerns New threat models and novel attacks CPU manufacturers investing in security Trusted Platform Module (TPM) No Execute bit (NX-bit) Supervisor Mode Execution/Access Prevention (SMEP/SMAP) AES Encryption Extensions SHA Hash Extensions MPX: Memory Protection Extensions SGX {Software Guard Extensions (Isolated Execution) IPT {Identity Protection Technology ARM Trustzone; Amazon CloudHSM ... Sept. 27, 2018 EE260 8 / 21 Trend 2: Malware is Brewing McAfee malware \zoo" as of Q2 2018: 750 million samples Over 40 mil new samples this period Mobile malware arriving in earnest Source: Mcafee Q2 2018 threat report Sept. 27, 2018 EE260 9 / 21 Trend 2: Malware is Brewing McAfee malware \zoo" as of Q2 2018: 750 million samples Over 40 mil new samples this period Mobile malware arriving in earnest Source: Mcafee Q2 2018 threat report Sept. 27, 2018 EE260 9 / 21 Trend 2: Malware is Brewing McAfee malware \zoo" as of Q2 2018: 750 million samples Over 40 mil new samples this period Mobile malware arriving in earnest Source: Mcafee Q2 2018 threat report Sept. 27, 2018 EE260 9 / 21 Trend 2: Malware is Brewing McAfee malware \zoo" as of Q2 2018: 750 million samples Over 40 mil new samples this period Mobile malware arriving in earnest Source: Mcafee Q2 2018 threat report Sept. 27, 2018 EE260 9 / 21 Spam click fraud $$ $$ Command and control PPI Server Botnet Installs: 80-100 USD per 1000 machines (US); 7-8 USD per 1000 machines (Asia) Underground Malware Economy: Pay-per-install Command and control PPI Server Botnet Source: Cabalerro et al. \Measuring pay-per-install..." Usenix 2011 Sept. 27, 2018 EE260 10 / 21 Spam click fraud $$ $$ Command and control PPI Server Botnet Installs: 80-100 USD per 1000 machines (US); 7-8 USD per 1000 machines (Asia) Underground Malware Economy: Pay-per-install Command and control PPI Server Botnet Source: Cabalerro et al. \Measuring pay-per-install..." Usenix 2011 Sept. 27, 2018 EE260 10 / 21 Spam click fraud $$ $$ Command and control PPI Server Botnet Installs: 80-100 USD per 1000 machines (US); 7-8 USD per 1000 machines (Asia) Underground Malware Economy: Pay-per-install Command and control PPI Server Botnet Source: Cabalerro et al. \Measuring pay-per-install..." Usenix 2011 Sept. 27, 2018 EE260 10 / 21 Spam click fraud $$ $$ Command and control PPI Server Botnet Underground Malware Economy: Pay-per-install Command and control PPI Server Botnet Installs: 80-100 USD per 1000 machines (US); 7-8 USD per 1000 machines (Asia) Source: Cabalerro et al. \Measuring pay-per-install..." Usenix 2011 Sept. 27, 2018 EE260 10 / 21 Malware: Summary Sept.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    82 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us