AppliedMicro Trusted Management Module



Similar documents
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN

All Programmable Logic. Hans-Joachim Gelke Institute of Embedded Systems. Zürcher Fachhochschule

Architekturen und Einsatz von FPGAs mit integrierten Prozessor Kernen. Hans-Joachim Gelke Institute of Embedded Systems Professur für Mikroelektronik

High-Performance, Highly Secure Networking for Industrial and IoT Applications

Product Brief. R7A-200 Processor Card. Rev 1.0

M-Shield mobile security technology

Digitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai Jens Onno Krah

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Using a Generic Plug and Play Performance Monitor for SoC Verification

Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery

System Design Issues in Embedded Processing

SHE Secure Hardware Extension

FIPS Security Policy 3Com Embedded Firewall PCI Cards

Cisco VPN Internal Service Module for Cisco ISR G2

Definition of a White Box. Benefits of White Boxes

ZigBee Technology Overview

7a. System-on-chip design and prototyping platforms

Data and Control Plane Interconnect solutions for SDN & NFV Networks Raghu Kondapalli August 2014

What is a System on a Chip?

Cisco Integrated Services Routers Performance Overview

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Internet of Things. Opportunities for device differentiation

KeyStone Architecture Security Accelerator (SA) User Guide

ALL-AIO-2321P ZERO CLIENT

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

- Introduction to PIX/ASA Firewalls -

SecureDoc Disk Encryption Cryptographic Engine

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

Building Blocks for PRU Development

Teradici Remote Workstation Karte PCoIP Host Card Overview

Secure Network Communications FIPS Non Proprietary Security Policy

STM32 F-2 series High-performance Cortex-M3 MCUs

Security in Automotive Applications

OpenSPARC T1 Processor

ALL-ZC-2140P-DVI PCoIP Zero Client Overview

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

How To Use Nuc123 (Nuc123) For A Week

System-on-a-Chip with Security Modules for Network Home Electric Appliances

PCI Express Impact on Storage Architectures and Future Data Centers. Ron Emerick, Oracle Corporation

Route Processor. Route Processor Overview CHAPTER

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features

Using Network Virtualization to Scale Data Centers

High Performance or Cycle Accuracy?

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Virtual Privacy vs. Real Security

Pre-tested System-on-Chip Design. Accelerates PLD Development

LSI SAS inside 60% of servers. 21 million LSI SAS & MegaRAID solutions shipped over last 3 years. 9 out of 10 top server vendors use MegaRAID

Going Linux on Massive Multicore

ARM Cortex -A8 SBC with MIPI CSI Camera and Spartan -6 FPGA SBC1654

Trusted Platforms for Homeland Security

Virtualized Security: The Next Generation of Consolidation

Advanced Core Operating System (ACOS): Experience the Performance

SABRE Lite Development Kit

Accelerating the Data Plane With the TILE-Mx Manycore Processor

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

BroadSAFE Enhanced IP Phone Networks

Cloud-Based Apps Drive the Need for Frequency-Flexible Clock Generators in Converged Data Center Networks

Use Cases for the NPS the Revolutionary C-Programmable 7-Layer Network Processor. Sandeep Shah Director, Systems Architecture EZchip

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

i.mx USB loader A white paper by Tristan Lelong

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS Non-Proprietary Cryptographic Module Security Policy

Networking Virtualization Using FPGAs

Networking Goes Open-Source. Michael Zimmerman VP Marketing, Tilera

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

MPX28. o UART, SD-CARD, I2C, PWM, Serial Audio, SPI Power management optimized for long battery life 3.3V I/O

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Side Channel Analysis and Embedded Systems Impact and Countermeasures

i.mx Trust Architecture Protects assets of multiple stakeholders Guards against sophisticated attacks Assures software measures TM 2

IINS Implementing Cisco Network Security 3.0 (IINS)

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Pulse Secure, LLC. January 9, 2015

Haswell Cryptographic Performance

Implementing Cisco IOS Network Security

Securing IP Networks with Implementation of IPv6

Von der Hardware zur Software in FPGAs mit Embedded Prozessoren. Alexander Hahn Senior Field Application Engineer Lattice Semiconductor

PCI Express and Storage. Ron Emerick, Sun Microsystems

Using the CoreSight ITM for debug and testing in RTX applications

QorIQ T4 Family of Processors. Our highest performance processor family. freescale.com

Bare-Metal, RTOS, or Linux? Optimize Real-Time Performance with Altera SoCs

DesignWare IP for IoT SoC Designs

PEX 8748, PCI Express Gen 3 Switch, 48 Lanes, 12 Ports

Cisco Nexus 7000 Series Supervisor Module

Network connectivity controllers

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

ALL-ZC-2321P-PoE PCoIP PoE Zero Client Overview

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version

Bivio 7000 Series Network Appliance Platforms

Chapter 1 Lesson 3 Hardware Elements in the Embedded Systems Chapter-1L03: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

DRAFT Standard Statement Encryption

SBC6245 Single Board Computer

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

OMAP platform security features

4/2/2014 Linux Dev-Boards. Linux Dev Boards. Tagung Forth Gesellschaft e.v. Maerz file:///home/cas/talk/linux-boards/html/linux-boards.

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Transcription:

AppliedMicro Trusted Management Module Majid Bemanian, Sr. Director of Marketing, Applied Micro Processor Business Unit July 12, 2011 Celebrating 20 th Anniversary of Power Architecture 1

AppliedMicro (APM) at a Glance Headquarters: Sunnyvale, CA Global Footprint: N.A., Europe, Asia Employees: 607 Market-cap: $612M Ticker: AMCC FY10 Revenues: $248M 2

PACKETPRO Feature Summary Market Drivers Bandwidth Explosion Video Social Networking Device Explosion Processor Requirements Deterministic Behavior QM/TM, Offloads Converged Networks Users & Data on the Move Access any data, any device Reduce Latency High Availability End to End Security Integrated Offload, QM/TM AMP through SLIMPRO Cryptographic Boundary Energy Management PoE Energy Efficient Ethernet Concurrency & Independency Multi-Core AMP, SLIMPRO Extend Power Management SLIMPRO 3

Typical Enterprise System 2-5 cards Backplane / Redundant Switch Fabric Switch Fabric (XBar) DDR DDR Backplane Serdes Management Processor 8+ Cores 2.5+ GHz Management Module Routing Tables Control Plane 1.0+ GHz 2-4 Cores Mem Mem Mem Mem NPU / Data Plane Processors Line Module Control Plane 1.0+ GHz 2-4 Cores Mem Mem Mem Mem ASIC / ASSP / Soft Silicon Line Module DDR DDR 10/40/100 10/40/100 10/40/100 10/40/100 Platform Security Fiber / Copper Fiber / Copper Payload Security 4

PACKETPRO Multi-Core Processor Family 32b 465 PPC 1.5GHz 256KB L2 MutiCore 32b 465 PPC 1.5GHz 256KB L2 High Speed I/O PCIe G2 SATA GE (EEE) Classifier Traffic Manager Packet DMA Off-loads & Management Classifier Security Engine Interrupts MPIC Queue Manager SLIMPRO Packet Parser, Crypto Engine. RTC, PKA/TRNG, SecRAM, EFUSE Non-blocking Bridge Fabric Non-blocking Bridge Memory Queue 16/32/64 bit Memory Controller w/ ECC DDR2/3, 1600Mbps PPC Mailbox GPIO SPI I 2 C Standard IO LCD CNTRL UART USB2.0 JTAG Trace Clocks Flash IO 5

PACKETPRO Unique Differentiators Crypto Boundary Power Management Secure Boot Crypto Engine WoX Wake on LAN, USB, GPIO, Standby Power mode Protected Private Keys Soft SKU Dynamic Freq. Scaling Energy Efficient Ethernet Independent Boot Crash Recovery/ Fail Over Look-aside Security & Classification QM/TM OS / Code Protection Resource Virtualization IPsec MACsec In-Line Classification High Availability & Concurrency Hierarchical Offloads 6

Multi-Layered Security Crypto Engine AES-GCM, AES-CBC modes of encryption AES-GMAC of authentication SHA1 engine for hash generation PKA High Performance large-vector arithmetic functions Unsigned value modular exponentiation Including Chinese Remainders Theorem (CRT) Modular inversion ECC point addition/doubling on elliptic curve ECC point multiplication on elliptic curve AES-GCM, AES-CBC modes of encryption Crypto Offlaod TRNG ANSI X9.17 Annex C Inline IPSec AES-GCM; AES-GMACTunnel and Transport modeesp Encryption and Authentication IPv4 and IPv6 Security Associations Wire speed operation In-Line Security Packet Pro SoC Look aside Security Encryption Algorithm DES, 3DES, AES-128/192/256, ARC4 Hash Algorithm SHA-1/ 224/ 256/ 384 /512 AES-XCBC-MAC GHASH SSL /TLS /DTLS MACSec 7

SLIMPRO Scalable Light-weight Intelligent Management Processor embedded in a Secure Green Zone Gated and guarded from any on-chip or external access / attacks Secure connections to remote agents SLIMPRO Application Power Management Secure Boot Trusted Management Module Secure Debug Concurrent & Secure AMP Description Ultra Fine SoC Frequency, Voltage and feature control. 200mW to full operation. Authenticate OS, System S/W and Loader. Real-time Security Agent On-chip protected Private / Public storage; Crypto Engine. Tamper Detection and Response Secure remote monitoring, debug, update and reporting Secure domain protection. Concurrent and independent MultiCore operation NV Storage 32bit Processor Mail Box & Gateway MultiCore SoC Fabric Secure Green Zone PKA/ TRNG Crypto Security Engine I/D RAM I2C RTC ROM GPIO Secure Ethernet Traffic 8

APM Trusted Management Module (TMM) Securely store keys, passwords and digital certificates to support Platform Integrity and Privacy Security Measure Encrypted Image Secure Boot Secure Communication Runtime Integrity Check Secure Software Updates Secure Debug Hardware Integrity Protecting Against Using symmetric bulk decryption provide code secrecy Leveraging PKA hardware acceleration authentic the origin and the integrity of the image before execution Communicate with a remote host using secure communications Perform checks on system in order to reduce attack surface area Decrypt and authenticate new software images before updating Remote management and debug Authenticate System Components 9

SLIMPRO Trusted Management Module Dedicated Secured Processor Core for Embedded Security Levels of Security Offerings Secure, Protected DRAM Operation Key Zeroization Tamper Detection Detection of Violations or Breaches Tamper Response Secure Boot Decrypt & Authentication Secure Communication Runtime Integrity Check Secure Protected Tamper-Proof Zone Protected Real Time Clock Code Authentication Flow Cryptographic Boundary 10

Securing the borders Processor Core(s) Secured ROM RAM NV Storage GE/10GE PCIe Gen I/II USB SATA DDR3 Memory Crypto Engine CPU I2C Controller I/O DDR3 NAND/NOR Bridge (Fence) PKA/ TRNG RTC Flash Hardware Offloads Security Classifier Queue Manager Traffic Manager 11

Symmetric Boot OS Independence Independent Boot process CPU cores operate independent of SoC peripherals Reset of one CPU doesn t effect the other Interrupts are routable through MPIC PPC0 L2 USB 1 UART1 GE 1 Boot Source SLIMpro DDR3 Common System Configuration Secure Perimeter Configure Clock and Power Supply Bridge Initialization Init QM, MPIC Init PPC1 L2 Unencrypted / Authenticate Boot Loader Take PPC0 & PPC1 out of Reset USB 2 UART2 PCIe 12

Code Protection Symmetric bulk decryption Secure Code Validation & decryption Begin Boot Process E-Fuse Secure Boot Enable Y SLIMpro Exec. Code From on-chip ROM Load Encrypted Image from Boot Device Decrypt & Authenticate SLIMpro Image Authentication Pass? N Y N Boot Standard SLIMpro Boot Power PC Core(s) Load Image to SLIMpro Instruction RAM Jump to Authenticated Code Execution Load & Lock SoC Configuration Load Encrypted PPC Boot Image Decrypt & Authenticate Image Authentication Pass? Y N Boot Loader Validation E-Fuse Configured Fail Action E-Fuse Configured Fail Action Boot Power PC Core(s) 13

Secure Loader Packet Pro 2 nd Stage Boot Loader PPC PPC (4) 1 st Stage Boot Loader (1) (2) SLIMpro Secure RAM On-Chip- Memory (JTAG Disabled) (3) E FFFF FFFC Encrypted Flash DDR3 (5) 2 nd Stage BL (6) (1) block Copy (2) Build1 st Stage BL (3) Point PPC Reset Vector (4) Copy 2 nd Stage BL (5) Decrypted 2 nd Stage BL (6) Jump to 2 nd Stage BL 14

OS / Application Loader OS Image Messages Mail Box SLIMPro Secure SRAM Mail Box Crypto Engine PPC PPC Block Block Block OS Image Header DDR3 Application Image(s) Packet Pro Block Block Block Application Image(s) Header Encrypted Flash 15

Run Time Integrity Check DMA OS image to SLIMpro Secure RAM Generate per block Compare Generated with Flash Create Exception or Pass Block (0) Block (1) Block (m) DDR3 OS Image Messages Mail Box SLIMPro Timer Secure SRAM Mail Box Crypto Engine PPC PPC Packet Pro OS Image Flash Encrypted Flash OS Image 16

PACKETPRO Feature Summary Market Drivers Bandwidth Explosion Video Social Networking Device Explosion Processor Requirements Deterministic Behavior QM/TM, Offloads Converged Networks Users & Data on the Move Access any data, any device Reduce Latency High Availability End to End Security Integrated Offload, QM/TM AMP through SLIMPRO Cryptographic Boundary Energy Management PoE Energy Efficient Ethernet Concurrency & Independency Multi-Core AMP, SLIMPRO Extend Power Management SLIMPRO 17

Questions & Answers During the webinar: Send questions to Host in the Chat Window. AppliedMicro Proprietary & Confidential 18

Thank you! Celebrating 20 th Anniversary of Power Architecture 19