Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

21
Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing

Transcript of Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Page 1: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Lecture 1: Introduction

Fred ChongCS290N Architectural Support for

Secure and Reliable Computing

Page 2: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Description

• This course will examine architectural designs and mechanisms that enhance the security and reliability of computing systems. The course will initially cover the basic properties and building blocks of secure and reliable systems from an architect's perspective. Then we will survey the state of the art. Students will pursue an in-depth class research project relating to the topics covered.

Page 3: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Logistics

• Time: TR 9-10:50 Room: Phelps 2510 Instructor: Prof. Fred Chong; office hours by appointment; Eng I 5163Textbook: Security Basics for Computer Architects , by Ruby B. Lee. (should be free from a UCSB machine)

• http://www.cs.ucsb.edu/~chong/290N/• No class: 5/20,22

Page 4: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Deadlines

• Project Proposal due 4/15 • Project Drafts due 5/20 • Project final papers due 6/6

Page 5: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Grading

• Problem Sets 15% • Discussion Topic 25% • Project Proposals and Drafts 20% • Project Final Report 40%

Page 6: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Problem Sets

• For each assigned paper, write up the following and e-mail me a copy before class: – A summary of the main points of the paper. – A critique of any shortcomings of the paper. – Any ideas on how one would extend the ideas in

the paper or address its shortcomings.

Page 7: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Leading Discussion

• Assign a paper for the class to read, one week before your discussion day.

• Present the paper and supplemental material on your assigned day. Lead discussion, with my help, on the subject.

Page 8: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Project Paper

• The project has two goals: – A critique of 3-5 related research papers. This is not a

book report. Do not just summarize what is in the papers. Point out shortcomings and possible areas for extension.

– Extension of the area. Address shortcomings or extend the work in the papers. Come up with some ideas and test them with a short project. This can be in the form of some simple analysis, simulations, algorithms, or models. Remember to pick something that will fit in a quarter.

• Example project paper: – http://www.cs.ucsb.edu/~chong/ftchong-area.ps

Page 9: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

• Textbook: Security Basics for Computer Architects , by Ruby B. Lee. (should be free from a UCSB machine)

• Synthesis Lecture– Short, geared towards researchers

Page 10: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Security Properties

• Reliability is related to Security• Sometimes termed together as “Trustworthy Systems”

Page 11: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Access Control

Page 12: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Forensic Properties

Page 13: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Individual Properties

Page 14: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Trustworthy vs Trusted

• Secure Computer System– Ideally provides Integrity, Confidentiality, Availability

• Trustworthy Computer– Designed to be dependable and provide security properties

• Trusted Computer– Security depends upon this machine and all bets are off if it is

compromised• Trusted Computing Base

– All hw and sw that must be trusted– No commodity systems form a dependable trusted computing base– TCM (Trusted Computing Module) – a piece that can be trusted

Page 15: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Attacks by Property

Page 16: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Attacks by Modality

Page 17: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Remote vs Physical Access

• Remote Intrusion• Physical Access– Software attacks– Passive electro-magnetic, thermal observation– Physical tampering• Memory bus probes• Exposing the chip die

Page 18: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Security Architecture Design Methodology

Page 19: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

“Lee’s Mantra”

Page 20: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Reading

• Ch 1 and 2 of Lee’s book

Page 21: Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Example: Minos and DACODA

• Defense against remote intrusions• Control-flow hijacking– Buffer-overflow attacks

• Signature-based defenses• Zero-Day Attacks