Abstracts of Presentations

Security Basics (Ruby Lee, Princeton):

We will start the tutorial with a quick overview of fundamental security concepts. Topics covered include threat models, security properties, security design methodology, basic cryptography, security policies, and security protocols.
Different security mechanisms will be discussed in the following talks.

Mobile hardware security (Rob Aitkin, ARM):

We will discuss ARM Trustzone security and its underlying hardware implementation, along with the rationale behind its design. We will also discuss general security requirements for smartphone SOC designs and secure IoT design, and look at some elements of trust and authentication. Finally we discuss the issues of deployment and standardization across an ecosystem, and the implications of both on general security solutions.

Secure Systems Design (David Kaplan, AMD):

Two basic tenants of secure systems design are discussed: Integrity and Isolation. Integrity, the mechanism by which you can ensure that a system exhibits the intended behavior and Isolation, the mechanism by which you can contain and restrict what a system can do or what can be done to it. Both concepts will be illustrated with practical examples of secure boot, authenticated boot, secure hypervisors and physical secure coprocessors as well as the ecosystem elements such as key distribution services and a discussion of integrity challenges in modern SOC designs to make it all work together.
The objective of this lecture is to give the student a broad overview of secure systems design elements and how they fit together in practice.

Improved performance of cryptographic algorithms in the recent Intel processors (Shay Gueron, Intel and University of Haifa)

We will review the recent improvements in the performance of various cryptographic algorithms, in the recent Intel architectures: codename Haswell and Broadwell. We will demonstrate how the architectural and micro-architectural enhancements can be bundled with new algorithmic and software methods, to obtain significant performance gains. The tutorial will cover symmetric ciphers such as AES in multiple modes of operation, AES-GCM authenticated encryption, and Poly1305/ChaCha. We will also review the performance of public key cryptographic algorithms such as RSA, DHE, DSA, ECDH, ECDSA. Finally, we will discuss the deployment of these improvements through open source libraries.

University Research in Hardware Security (Ruby Lee)

We will survey some of the research efforts in hardware security in academia.