Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer...

42
Securing the New Golden Age of Computer Architecture Ted Speers, Head Of Product Arch & Planning March 13, 2019

Transcript of Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer...

Page 1: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

Securing the New Golden Age of Computer ArchitectureTed Speers, Head Of Product Arch & Planning

March 13, 2019

Page 2: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

About Microchip FPGAs

Page 3: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

3

Number One from Low Earth Orbit to Beyond Pluto

IRNSS7 Satellites Launched 2013-2016

RTAX2000S

Iridium NextFirst 10 Satellites Launched 2017

GOES-RClimate Satellite Launched 2016

JUNOEntered Jupiter Orbit 2016

RTSX32SU, RTAX250S, RTAX2000S

Pluto New HorizonsPluto Images 2015

RTSX32SU, RTSX72SU

RosettaOrbits and Lands on Comet 2014

Legacy RT FPGAs

RTSX32SU, RTAX250S, RTAX1000S, RT3PE3000LRTSX72SU, RTAX2000S

Page 4: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

4

Airbus A380• APA, A500K, SX-A, AX FPGAs• Flight computers, cockpit

displays, engine controls, power distribution, . . .

Boeing 787 Dreamliner• APA, A3P, AX FPGAs• Flight computers, cockpit

displays, engine controls, braking, power distribution,cabin pressure, flight surface actuation . . .

Airbus A350 XWB• APA, A3P FPGAs• Flight computers, cockpit displays, braking,

engine controls, power distribution,cabin pressure, flight surface actuation . . .

Number One Above 30000 Feet

Boeing 777-300ER• A3P, Igloo2 FPGAs• Flight computers, power

distribution, engine controls, electronic control networks, flight surface actuation. . .

Page 5: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

5

Comprehensive Womb-to-Tomb Security Architecture

???

Page 6: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

6

Award Winning PolarFireFPGA as an SoC platform

Proven SecurityDefense-grade securityDPA safe Crypto coprocessorBuilt-in anti-tamper

Exceptional ReliabilitySEU immune configurationBlock RAM with ECCExtended temperatures

Lowest PowerLow static power technologyPower optimized transceiversUp to 50% lower than SRAM FPGAs Control Plane

Signal Processing

Video & Image Processing Hardware

Acceleration

10G Bridging & Aggregation

Low Power Optics

PortableEquipment

Page 7: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

Who joins the RISC-V Foundation?

Page 8: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

8

Page 9: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

9

Board of Directors

Page 10: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

10

RISC-V IP Providers

Page 11: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

11

Semiconductor OEMs

Page 12: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

12

Academia & Research

Page 13: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

13

System OEMs

Page 14: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

14

EDA, IP and Support

Page 15: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

15

Debug, OS and Tools

Page 16: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

16

Datacenter

Page 17: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

17

Modern fabs

Page 18: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

18

Emerging Applications

Page 19: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

The New Golden Age of Computer Architecture

Page 20: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

20

2017 Turing Award Lecture

Page 21: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

Building a secure world from the ground up

Page 22: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

22

Activity of Note: Formal Spec

Page 23: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

23

Activity of Note: Formal Spec

Page 24: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

24

Activity of Note: Formal Spec

Page 25: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

25

RISC-V Members Through a Security Filter

Chip CompaniesDefense Companies

Security IP Security Services and Tools

Page 26: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

26

Activity of Note:Security Standing Committee

Security Steering Committee Main Goals Promote RISC-V as an ideal vehicle for the security community Liaise with other internal RISC-V committees and with external security committees Create an information repository on new attack trends, threats and countermeasures Identify top 10 open challenges in security for the RISC-V community to address Propose security committees (Marketing or Technical) to tackle specific security topics Recruit security talent to the RISC-V ecosystem (e.g., into committees) Develop consensus around best security practices for IoT devices and embedded systems

Page 27: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

27

Speaker Program: Gernot Heiser, Data61

Page 28: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

28

Timing Channels

Page 29: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

29

Mitigating Timing Attacks

Page 30: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

30

New Hardware-Software Contract!

Page 31: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

31

Augmented ISA

Page 32: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

32

Putting it all Together: The RISC-V Security Stack

Compliance Suite,

RISC-V implementation Formal RISC-V ISA spec

Secure SBI Formal aISA Specification

Secure seL4 Microkernel Formal seL4 Specification

RichOS (e.g. Linux)

Page 33: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

Start creating a secure future today with Microchip and RISC-V

Page 34: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

34

PolarFire SoCRISC-V-based SoC FPGA

Freedom to Innovate in

Thermal and Power Constrained Systems

Linux and Real-TimeHigh-Reliability Safety Critical Systems

Securely Connected IoT Systems

Page 35: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

35

Secure Boot Guards against sophisticated methods of

attack whereby a malicious external agent tampers with the boot image stored in bootflash (e.g Linux FSBL)

Authenticates the image in bootflash before transferring execution control to the OS boot loader pointed to by reset vector

FPGA system controller (root of trust) manages the authentication process and certifies boot image using crypto functionality built into the FPGA backbone Push “zero state boot loader” (ZSBL) upon detecting HW

reset. Release monitor core from reset and executes

authentication on FSBL image pointed to by reset vector. If authentication is successful, transfer execution control

back to FSBL, otherwise abort.

Reset Vector

BootFlash

FSBLHW RESET

System Controller

Crypto Processor

PUF

sNVM

System Services

NRBG

RISC-VRV64IMAC

Monitor CoreE51

PMP SecureBoot

16K L1I$

8K DTIM

PushZSBL

Root of

Trust

Page 36: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

36

ZSBL bootloader authenticates FSBL image in bootflash which contains: Actual FSBL image

SBIC data structure generated during bootflash programming and stored @ SBIC_ADDR

Authenticity of SBIC is verified by FPGA system controller using ECDSA: UCSQ is a public key programmed on the device by the user Corresponds to UCSK private key used to sign the SBIC during programming

ECDSAVERIFY (UCSQ, IMAGE_ADDR | IMAGE_LEN | BOOTVEC0-4 | H, CODESIG)

Elliptic Curve Digital Signature Algorithm (ECDSA)

CODESIG = ECDSASIGN (UCSK, IMAGE_ADDR | IMAGE_LEN | BOOTVEC0-4 | H)

Authentication Framework

Page 37: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

37

PolarFire HiFive Unleashed Expansion

Freedom to Begin Hardware Development

Page 38: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

38

Freedom to Start Software Development

Free Rapid Software Development and Debug Capabilities without Hardware

Complete PolarFire SoC Processor Subsystem Model

Page 39: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

39

Building Out the Mi-V RISC-V Ecosystem

Page 40: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

40

Where IDMs have Fabs

Taiwan –

https://en.wikipedia.org/wiki/List_of_semiconductor_fabrication_plants

Page 41: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

41

Where foundries have their fabs

Taiwan – birthplace of Golden AgesTaiwan –

https://en.wikipedia.org/wiki/List_of_semiconductor_fabrication_plants

Page 42: Securing the New Golden Age of Computer Architecture Ted ...€¦ · The New Golden Age of Computer Architecture. 20 2017 Turing Award Lecture. Building a secure world ... Augmented

Thank You