Hardware security
Simone Perriello
DEIB PhD student
DEIB- BIO1 Room (Bldg. 21, Second Floor)
October 1st, 2021
5.30 pm
Contacts:
Simone Perriello
Research Line:
System architectures
DEIB PhD student
DEIB- BIO1 Room (Bldg. 21, Second Floor)
October 1st, 2021
5.30 pm
Contacts:
Simone Perriello
Research Line:
System architectures
Abstract
On October 1st, 2021 at 5.30 pm Simone Perriello, DEIB PhD student, will hold a seminar titled “Hardware security“, as a part of his Summer School “ACACES 2021”.
Hardware underlying computer systems has long been assumed to be secure, a fundamental root of trust. However, decades of focus on performance with little regards on its security opened the doors to all kind of attacks on hardware devices. Attackers can now use a broader range of tools to attack the systems by exploiting architectural vulnerabilities (often introduced to increase efficiency) or physical information leakage (side-channel attacks). The thriving research in this area brought to the fore how it is crucial to rethink our hardware design process, including security from its early stage, since it is hard, impractical and often ineffective to add security afterwards.
Hardware underlying computer systems has long been assumed to be secure, a fundamental root of trust. However, decades of focus on performance with little regards on its security opened the doors to all kind of attacks on hardware devices. Attackers can now use a broader range of tools to attack the systems by exploiting architectural vulnerabilities (often introduced to increase efficiency) or physical information leakage (side-channel attacks). The thriving research in this area brought to the fore how it is crucial to rethink our hardware design process, including security from its early stage, since it is hard, impractical and often ineffective to add security afterwards.
In this seminar, we will introduce the main concepts involved in hardware design, showing real world examples of attacks against integrated chips and their possible countermeasures. We will also show how Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNGs), devices employed to ensure trust, integrity, and authenticity of information systems, if not carefully designed, can be another major threat to security.
Please, note that the event is meant for the internal personnel of the Department.