Technologies to Improve. Ernie Brickell
|
|
|
- Roger Wiggins
- 10 years ago
- Views:
Transcription
1 Technologies to Improve Platform Security Ernie Brickell Intel Corporation 9/29/2011 1
2 Security is Intel s Third Value Pillar Intel is positioning itself to lead in three areas: energy-efficient efficient performance silicon, connectivity, and security. Paul Otellini Intel CEO There s an urgent need for security innovation as people are spending more time online and the amount of data is growing. 2 Intel Architecture Group
3 Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 3 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching
4 Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 4 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching
5 Digital Random Number Generator (DRNG) Entropy Source BIST Online Health Tests Test Port DRNG Combined Conditioner/ Deterministic Random Bit Generator (DRBG) DRNG Wrapper Interface (embedding specific) A reusable circuit that provides an autonomous/self contained, complete DRNG Provides a hardware source of high quality, high performance entropy to be embedded across Intel products. It is composed of An all-digital Entropy Source, (3 Gbps, 90% Entropic) Runtime Entropy Source health measurement via Online Health Test, Conditioning (via AES CBC-MAC mode) and DRBGing (via AES CTR mode) post processing and Built In Self Test (BIST) and Test Port Standards compliant (NIST SP ) and FIPS 140-2/3 Level 2 certifiable as such 5
6 RDRAND Performance Preliminary data from pre-production p o Ivy Bridge sample 1 RdRand new CPU instruction which provides access to DRNG Up to 70 million RdRand invocations per second 500+ Million Bytes of random data per second Throughput ceiling is insensitive to number of contending parallel threads Steady state maintained at peak performance RdRand ds (Millions s/sec) Th hroughput (MB/sec) Throughput (RdRands/s) Number of Parallel Threads Throughput (MB/s) Number of Paralel Threads 6 Intel Architecture Group 1 Data taken from Intel processor codename Ivy Bridge early engineering sample board. Quad core, 4 GB memory, hyper-threading enabled. Software: LINUX* Fedora 14, gcc version (experimental) with RdRand support, test uses pthreads kernel API.
7 RdRand Response Time and Reseeding Frequency Preliminary data from pre-production Ivy Bridge sample 1 RdRand Response Time ~150 clocks per invocation Little contention until 8 threads (or 4 threads on 2 core chip) Simple linear increase as additional threads are added DRNG Reseed Frequency Single thread worst case: Reseeds every 4 RdRand invocations Multiple thread worst case: Reseeds every 23 RdRand d invocations At slower invocation rate, can expect reseed before every 2 RdRand calls NIST SP recommends 2 48 ) ck cycles) Time (Clo Response DRNG bit Outpu uts RdRand Response Time Number of Parallel Threads DRNG Reseed Frequency Number of Parallel Threads 1 Data taken from Intel processor codename Ivy Bridge early engineering sample board. Quad core, 4 GB memory, hyper-threading enabled. Software: LINUX* Fedora 14, gcc version (experimental) with RdRand support, test uses pthreads kernel API. 7 Intel Architecture Group
8 Software Side Channels Not Hardware Side Channel where adversary has physical access. Not Software Covert Channel where adversary has malware in a high security partition and a low security partition Software Side Channel Adversary has malware executing in a spy process, and tries to obtain information about an uncompromised target process executing on same platform. Target App with Protected Asset OS Spy App Inside trust boundary Outside trust boundary 8 Intel Architecture Group
9 Protection ti from software side channels Platform approach for software side channels AES-NI: CPU instructions for a round of AES PCLMULQDQ: CPU instructions for GF(2) Multiplication Recommend side channel mitigated implementations of other crypto algorithms No secret key or data dependent memory access (at coarser than cache line granularity) code branching Ex: RSA implemented with <6% performance reduction in OpenSSL 9 Intel Architecture Group
10 Crypto Performance Software improvements Multi-buffer Function Stitching Hardware improvements AES-NI PCLMULQDQ Microarchitecture improvements 10 Intel Architecture Group
11 Multi Buffer Performance 1 WSM Core Multi-buffer: Perform the same function on multiple independent data buffers 9,000 8,000 7,000 AES: Total Cycles / Buffer Single Buffer 8,438 6,000 Multi Buffer 5,000 4,000 3,000 2,528 3X 2,841 2,000 1, , Byte Distribution 0 Distribution Byte Excellent performance on AES CBC Encrypt 11 Intel Architecture Group *See Intel technical papers for full description of methodology and results.
12 Function Stitching Protocols such as SSL/TLS and IPsec apply two functions, confidentiality and integrity Improved performance by using multiple execution units more efficiently Fine grain integration achieves higher performance 1.4X Speedup on AES128 CBC-Encrypt with SHA1 (Cycles/Byte) Method to speedup combined Encrypt/Authenticate 12 Intel Architecture Group
13 Sandy Bridge Performance SNB 2 nd Generation Intel Core improves: AES-NI Throughput SIMD Processing via AVX ISA extensions Large-integer processing (public-key crypto) Multi Buffer Performance (Cycles/byte) Algorithm i5 650 i i Gain MD SHA SHA AES128 CBC Encrypt Modular Exponentiation Performance (Cycles) Algorithm i5 650 i i Gain 512 bit Modular Exponentiation 360, , bit Modular Exponentiation 2,722,590 1,906, Intel Architecture X Group additional performance gain on SNB!
14 Summary of reduction in trust boundary by virtualization and measured launch Component in Trust Boundary OS with kernel additions Devices that can DMA Apps installed by user Virtualization layer underneath the OS BIOS, including SMM Option ROMS Mitigation with virtualization and measured launch Use VT-x and Require fewer kernel additions and device drivers in some VMs Restrict DMA to a single VM through VT-d Restrict apps in protected VM, and sandbox suspect code Allow only acceptable VMMs to launch using TXT launch control policy Remove some or all of the BIOS from trust boundary using TXT and/or STM capability Remove Option ROMS from trust boundary using TXT 14 Intel Architecture Group
15 Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 15 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching
16 IPT 1.0: One Time Password (OTP) The first generation of Intel IPT is a dynamic code generated on 2nd generation Intel Core processor-based PCs that is protected from malware in the OS. Single use, (i.e. 30 second, time-limited code OTP ) A hardware level 2nd factor of authentication Works with leading OTP Solutions from Symantec & Vasco Traditional hardware token CPU OTP Client App / Browser Intel IPT Middleware ME Embedded OTP App Now embedded into your PC Intel ISV No system can provide absolute security under all conditions. Requires an Intel IPT enabled system, including a 2 nd generation Intel Core processor, enabled chipset, firmware and software. Available only on participating websites. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit 16 [ Intel Architecture Group
17 Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 17 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching
18 Supervisor Mode Execution Protection (SMEP) Operating System Supervisor Mode (Kernel Mode / Ring-0) User Mode Can perform any task on system Can perform limited tasks on system Prevents attacks when executing user-mode code in ring-0 Extends Intel execute Disable capability Available on Intel CPUs starting 2012 How does SMEP work? 0xF..FFF 1. Syste em call 0x Kernel Memory NULL pointer vulnerability App memory Attack code re Mode ges) ock or call malwar n Mode Sprvsr. privileg M P would 2. Jump blo o Supervisor on while in M SMEP executio (with S Example where SMEP benefits: Stuxnet worm SMEP would have prevented one method of attack by Stuxnet > Escalation of Privilege attack SMEP can prevent malware exploiting EoP vulnerabilities from executing 18 Intel Architecture Group
19 McAfee DeepSAFE Technology platform co-developed with Intel Not a product, the foundation for new solutions Hardware-assisted, security-focused, system monitor Sits below the OS to provide a new vantage point for security Solutions to be announced soon. Announcement from McAfee: 19 Intel Architecture Group
20 Intel Security & Trust Pillars Identity Protection & Fraud Deterrence 20 Detection & Prevention of M l Malware Intel Architecture Group Securing Data and Assets Recovery and Enhanced Patching
21 Recommend BIOS Hygiene NIST SP BIOS protection Guidelines Use digital signatures to verify the authenticity of BIOS updates. BIOS updates verified using a Root of Trust for Update which includes: The key store used to verify signatures on updates. The digital signature verification algorithm. Use of NIST-approved crypto algorithms. Recommend rollback protection. SP April2011.pdf pdf Minimize TCB for system boot 21 Intel Architecture Group
22 Intel Security & Trust Pillars Identity Protection & Fraud Deterrence Detection & Prevention of M l Malware Securing Data and Assets Recovery and Enhanced Patching Stay tuned for future improvements in all pillars 22 Intel Architecture Group
23 Feedback What else should Intel be doing? Are we on the right track? 23 Intel Architecture Group
24 Technical Papers - 1 Breakthrough AES performance with Intel AES New Instructions Processing Multiple buffers in parallel Fast Cryptographic computation on IA processors via Function Stitching Fast and Constant-time Implementation of Modular Exponentiation f Fast CRC Computation for iscsi Polynomial using CRC32 Instruction Optimized Galois-Counter-Mode Implementation on IA Processors High Performance Storage Encryption on Intel Architecture Processors 24 Intel Architecture Group
25 Technical Papers - 2 Fast CRC Computation for Generic Polynomials using PCLMULQDQ Instruction p// / / /p p / p High Performance DEFLATE Decompression on Intel Architecture Processors Cryptographic Performance on the 2 nd Generation Intel Core Processor Fast Parallel CRC Computation using the Nehalem CRC32 instruction Using Intel AES New Instructions and PCLMULQDQ to Significantly Improve IPSec Performance on Linux IDF 2010 Presentation ti with Voice: Examining i the Performance of Intel AES New Instructions on Intel Core i7 Processor html 25 Intel Architecture Group
26
The Impact of Cryptography on Platform Security
The Impact of Cryptography on Platform Security Ernie Brickell Intel Corporation 2/28/2012 1 Security is Intel s Third Value Pillar Intel is positioning itself to lead in three areas: energy-efficient
Haswell Cryptographic Performance
White Paper Sean Gulley Vinodh Gopal IA Architects Intel Corporation Haswell Cryptographic Performance July 2013 329282-001 Executive Summary The new Haswell microarchitecture featured in the 4 th generation
AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition
Directions in Authenticated Ciphers DIAC 2013, 11 13 August 2013, Chicago, USA AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition Shay Gueron University
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
Processing Multiple Buffers in Parallel to Increase Performance on Intel Architecture Processors
White Paper Vinodh Gopal Jim Guilford Wajdi Feghali Erdinc Ozturk Gil Wolrich Martin Dixon IA Architects Intel Corporation Processing Multiple Buffers in Parallel to Increase Performance on Intel Architecture
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation
SECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
Improving OpenSSL* Performance
White Paper Vinodh Gopal Jim Guilford Erdinc Ozturk Sean Gulley Wajdi Feghali IA Architects Intel Corporation Improving OpenSSL* Performance October 2011 326232-001 Executive Summary The SSL/TLS protocols
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System Dipl.-Inform. Rolf Haas Principal Security Engineer, S+,CISSP
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Windows Server Virtualization & The Windows Hypervisor
Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Legal Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2
Using the TPM to Solve Today s Most Urgent Cybersecurity Problems
Using the to Solve Today s Most Urgent Cybersecurity Problems May 20, 2014 10:00AM PDT 2 Stacy Cannady, Technical Marketing Trustworthy Computing, Cisco Stacy Cannady, CISSP, is technical marketing - Trustworthy
Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems
Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron Haifa Univ. and Intel Yehuda Lindell Bar-Ilan University Appeared at ACM CCS 2015 How to Encrypt with
Intel Identity Protection Technology (IPT)
Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
Performance of Software Switching
Performance of Software Switching Based on papers in IEEE HPSR 2011 and IFIP/ACM Performance 2011 Nuutti Varis, Jukka Manner Department of Communications and Networking (COMNET) Agenda Motivation Performance
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Software Token Security & Provisioning: Innovation Galore!
Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager,
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0
Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared
Intel Xeon Processor E5-2600
Intel Xeon Processor E5-2600 Best combination of performance, power efficiency, and cost. Platform Microarchitecture Processor Socket Chipset Intel Xeon E5 Series Processors and the Intel C600 Chipset
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
Deeper Levels of Security with Intel Identity Protection Technology
WHITE PAPER Intel Identity Protection Technology Deeper Levels of Security with Intel Identity Protection Technology This technology is something you can take advantage of if your web site has a portal
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Security in the Cloud
solution brief Cloud Computing Security in the Cloud Intel Xeon Processor E5-4600/2600/2400/1600 Intel Technologies Enable More Secure Business Computing in the Cloud Would you like to begin transforming
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
Intel Virtualization Technology Overview Yu Ke
Intel Virtualization Technology Overview Yu Ke SSG System Software Division Agenda Virtualization Overview Intel Virtualization Technology 2 What is Virtualization VM 0 VM 1 VM n Virtual Machines (VMs)
Breakthrough AES Performance with. Intel AES New Instructions
White Paper Breakthrough AES Performance with Intel AES New Instructions Kahraman Akdemir, Martin Dixon, Wajdi Feghali, Patrick Fay, Vinodh Gopal, Jim Guilford, Erdinc Ozturk, Gil Wolrich, Ronen Zohar
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Intel Trusted Platforms Overview
Intel Trusted Platforms Overview Greg Clifton Intel Customer Solutions Group Director, DoD & Intelligence 2006 Intel Corporation Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
ClearPath MCP Software Series Compatibility Guide
ClearPath Software Series Compatibility Guide Overview The ClearPath Software Series is designed to deliver new cost and performance competitive attributes and to continue to advance environment attributes
CLOUD SECURITY: Secure Your Infrastructure
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
BroadSAFE Enhanced IP Phone Networks
White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1?
Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1? Shay Gueron University of Haifa Department of Mathematics,
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
Enterprise-Ready Security for Business Clients with Intel Processors
White Paper Intel Processors for Business Clients Enterprise-Ready Security for Business Clients with Intel Processors Executive Summary Business clients built on Intel processors offer strengthened security
Intel Core i3-2120 Processor (3M Cache, 3.30 GHz)
*Trademarks Intel Core i3-2120 Processor (3M Cache, 3.30 GHz) COMPARE PRODUCTS Intel Corporation All Essentials Memory Specifications Essentials Status Launched Add to Compare Compare w (0) Graphics Specifications
Using Intel AES New Instructions and PCLMULQDQ to Significantly Improve IPSec Performance on Linux*
White Paper Adrian Hoban Software Engineer Intel Corporation Using Intel AES New Instructions and PCLMULQDQ to Significantly Improve IPSec Performance on Linux* August 2010 324238-001 Executive Summary
SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS 140-2 Security Policy
SECUDE AG FinallySecure Enterprise Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.4 04/22/2010 Copyright SECUDE AG, 2010. May be reproduced only in its original entirety
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement. MJ0011 [email protected]
Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement MJ0011 [email protected] Agenda Background A Patched Vulnerability: CVE-2010-4398 Bypass DSE on Windows7 x64 Windows8
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
A Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
Disk encryption... (not only) in Linux. Milan Brož [email protected]
Disk encryption... (not only) in Linux Milan Brož [email protected] FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Mobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan Kari Kostiainen 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest in smartphone security 2 NA,
Intel Virtualization Technology (VT) in Converged Application Platforms
Intel Virtualization Technology (VT) in Converged Application Platforms Enabling Improved Utilization, Change Management, and Cost Reduction through Hardware Assisted Virtualization White Paper January
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Special Issue 2013, pp. 373 377 MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES Adrian FLOAREA
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
Using AES 256 bit Encryption
Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State
The Encryption Technology of Automatic Teller Machine Networks
Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. Agenda Intel + McAfee: What it means Computing trends and security
Security Policy. Trapeze Networks
MP-422F Mobility Point Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE
WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach
WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach Sponsored by: Intel John Humphreys June 2006 Tim Grieser IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200
Intel Xeon Processor E3-1200 Product Family
Product Brief Intel Xeon Processor E3-1200 Product Family Small Business Servers Intel Xeon Processor E3-1200 Product Family A new generation of processors for small business servers Servers based on the
High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago
High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
