Secure Processors Part I

Secure Processors Part I
Author: Victor Costan
Publisher:
Total Pages: 268
Release: 2017-07-13
Genre: Technology & Engineering
ISBN: 9781680833003

Download Secure Processors Part I Book in PDF, Epub and Kindle

This manuscript is the first in a two part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. This manuscript first examines the relevant concepts in computer architecture and cryptography, and then surveys attack vectors and existing processor systems claiming security for remote computation and/or software isolation. This work examines in detail the modern isolation container (enclave) primitive as a means to minimize trusted software given practical trusted hardware and reasonable performance overhead. Specifically, this work examines in detail the programming model and software design considerations of Intel's Software Guard Extensions (SGX), as it is an available and documented enclave-capable system. Part II of this work is a deep dive into the implementation and security evaluation of two modern enclave-capable secure processor systems: SGX and MIT's Sanctum. The complex but insufficient threat model employed by SGX motivates Sanctum, which achieves stronger security guarantees under software attacks with an equivalent programming model. This work advocates a principled, transparent, and well-scrutinized approach to secure system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead.

Secure Processors Part II

Secure Processors Part II
Author: Victor Costan
Publisher:
Total Pages: 128
Release: 2017-07-13
Genre: Technology & Engineering
ISBN: 9781680833027

Download Secure Processors Part II Book in PDF, Epub and Kindle

This manuscript is the second in a two part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The first part established the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves). This second part extends Part I's description of Intel's Software Guard Extensions (SGX), an available and documented enclave-capable system, with a rigorous security analysis of SGX as a system for trusted remote computation. This part documents the authors' concerns over the shortcomings of SGX as a secure system and introduces the MIT Sanctum processor developed by the authors: a system designed to offer stronger security guarantees, lend itself better to analysis and formal verification, and offer a more straightforward and complete threat model than the Intel system, all with an equivalent programming model. This two part work advocates a principled, transparent, and wellscrutinized approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead.

Principles of Secure Processor Architecture Design

Principles of Secure Processor Architecture Design
Author: Jakub Szefer
Publisher: Springer Nature
Total Pages: 154
Release: 2022-06-01
Genre: Technology & Engineering
ISBN: 3031017609

Download Principles of Secure Processor Architecture Design Book in PDF, Epub and Kindle

With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book aims to give readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered). This book aims to present the different challenges of secure processor architecture design to graduate students interested in research on architecture and hardware security and computer architects working in industry interested in adding security features to their designs. It aims to educate readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, this book presents numerous design suggestions, as well as discusses pitfalls and fallacies that designers should avoid.

Network Processor Design

Network Processor Design
Author: Mark A. Franklin
Publisher: Elsevier
Total Pages: 482
Release: 2003-12-02
Genre: Computers
ISBN: 0080491944

Download Network Processor Design Book in PDF, Epub and Kindle

Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to discuss latest research in the architecture, design, programming, and use of these devices. This series of volumes contains not only the results of the annual workshops but also specially commissioned material that highlights industry's latest network processors. Like its predecessor volume, Network Processor Design: Principles and Practices, Volume 2 defines and advances the field of network processor design. Volume 2 contains 20 chapters written by the field's leading academic and industrial researchers, with topics ranging from architectures to programming models, from security to quality of service. Describes current research at UNC Chapel Hill, University of Massachusetts, George Mason University, UC Berkeley, UCLA, Washington University in St. Louis, Linköpings Universitet, IBM, Kayamba Inc., Network Associates, and University of Washington. Reports the latest applications of the technology at Intel, IBM, Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum.

Computer Security – ESORICS 2017

Computer Security – ESORICS 2017
Author: Simon N. Foley
Publisher: Springer
Total Pages: 485
Release: 2017-09-01
Genre: Computers
ISBN: 3319664026

Download Computer Security – ESORICS 2017 Book in PDF, Epub and Kindle

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Secure and Trust Computing, Data Management, and Applications

Secure and Trust Computing, Data Management, and Applications
Author: James J. (Jong Hyuk) Park
Publisher: Springer
Total Pages: 265
Release: 2011-06-27
Genre: Computers
ISBN: 3642223397

Download Secure and Trust Computing, Data Management, and Applications Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address various theories and practical applications of secure and trust computing and data management in future environments.

National Security Law, Procedure and Practice

National Security Law, Procedure and Practice
Author: Caroline Stone
Publisher: Oxford University Press
Total Pages: 1105
Release: 2024-03-21
Genre: Law
ISBN: 0198895291

Download National Security Law, Procedure and Practice Book in PDF, Epub and Kindle

A comprehensive, detailed and updated account of UK national security law in all its aspects, National Security Law, Procedure and Practice is the only book to collate and explain all the elements of law, both substantive and procedural, and the practical issues which may arise in national security litigation. The specialised nature of the subject makes this book a vital text, not only for those seeking an overview of national security law, but also for experienced practitioners instructed to act in proceedings in which national security issues may arise. The intense media and public scrutiny which accompanies many national security cases makes this book of interest to a wider audience seeking to understand the legal context of such cases. This new edition draws on the professional experience of a team of expert contributors and covers all recent legislation, case law and guidance. It provides a detailed explanation of the National Security Act 2023, which repeals and replaces the existing law relating to state threats. The new Act introduces significant new offences and executive powers, including the power to impose state threat prevention and investigation measures ('STPIMs'), and creates a new scheme for the registration of foreign political influence activities. The second edition also includes analysis of the landmark Supreme Court decision in Shamima Begum, which re-evaluates the respective roles of the government and the courts in national security matters and has ramifications throughout the work; a comprehensive explanation of the National Security and Investment Act 2021; a fully revised chapter on sanctions law; and an updated explanation of the continued impact of EU law on UK national security law. This second edition of National Security Law, Procedure and Practice will be an invaluable resource for judges, policymakers, legislators, oversight bodies, academic experts and students in a variety of legal fields.

Transactions on Computational Science XI

Transactions on Computational Science XI
Author: Edward David Moreno
Publisher: Springer
Total Pages: 310
Release: 2010-12-07
Genre: Computers
ISBN: 3642176976

Download Transactions on Computational Science XI Book in PDF, Epub and Kindle

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 11th issue of the Transactions on Computational Science journal, edited by Edward David Moreno, is the second of two publications focusing on security in computing. The 14 papers in the volume address a wide range of hot topics within the sphere of security research, including new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.

Design and Performance Analysis of a Secure Processor Scan-sp with Crypto-biometric Capabilities

Design and Performance Analysis of a Secure Processor Scan-sp with Crypto-biometric Capabilities
Author: Raghudeep Kannavara
Publisher:
Total Pages: 178
Release: 2009
Genre: Biometry
ISBN:

Download Design and Performance Analysis of a Secure Processor Scan-sp with Crypto-biometric Capabilities Book in PDF, Epub and Kindle

Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property protection. Techniques like obfuscation attempt to transform the code into a form that is harder to reverse engineer. Tamper-proofing causes a program to malfunction when it detects that it has been modified. Software watermarking embeds copyright notice in the software code to allow the owners of the software to assert their intellectual property rights. The software techniques discourage software theft, can trace piracy, prove ownership, but cannot prevent copying itself. Thus, software based security firewalls and encryption is not completely safe from determined hackers. This necessitates the need for information security at the hardware level, where secure processors assume importance. In this dissertation, a detailed architecture and instruction set of the SCAN-Secure Processor is proposed. The SCAN-SP is a modified SparcV8 processor architecture with a new instruction set to handle image compression, encryption, information hiding based on SCAN methodology and biometric authentication based on Local Global Graph methodology. A SCAN based methodology for encryption and decryption of 32 bit instructions and data is proposed. The modules to support the new instructions are synthesized in reconfigurable logic and the results of FPGA synthesis are presented. The ultimate goal of the proposed work is a detailed study of the tradeoffs that exists between speed of execution and security of the processor. Designing a faster processor is not the goal of the proposed work, rather exploring the architecture to provide security is of prime importance.

Computer Architecture and Security

Computer Architecture and Security
Author: Shuangbao Paul Wang
Publisher: John Wiley & Sons
Total Pages: 342
Release: 2012-10-25
Genre: Computers
ISBN: 1118168836

Download Computer Architecture and Security Book in PDF, Epub and Kindle

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace. Examination of memory, CPU architecture and system implementation Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Design and implementation of a patent-pending secure computer system Includes the latest patent-pending technologies in architecture security Placement of computers in a security fulfilled network environment Co-authored by the inventor of the modern Computed Tomography (CT) scanner Provides website for lecture notes, security tools and latest updates