Todd Austin
Todd Austin
  • Видео 31
  • Просмотров 31 259
Hardware Security Tutorial - Part 7 - Recent Hardware Security Attacks
This video is the 7th episode of my HARDWARE SECURITY VIDEO TUTORIAL. This new episode examines RECENT HARDWARE SECURITY ATTACKS, specifically covering 14 new attacks from the (mostly) 2021-2024 timeframe. If you are looking to get up-to-date on the latest hardware security attacks, this is the video for you!
Here's what the video covers:
Recent Spectre-based attacks:
* Rust Arbitrary Buffer Overreads
* iLeakage: Timerless Spectre Attack
* PACMAN: ARM PAC Forgery Attack
Recent novel side channels:
* GoFetch: Prefetcher Side Channel
* Centauri: Rowhammer Tracking
* CIPHERLEAKs: Enclave Cryptanalysis
* AVX2 Power-Gating Side Channel
* Hertzbleed: Microarchitecture Sensors
* PortSmash: Port Con...
Просмотров: 765

Видео

Spectre V1 Attack on Safe Rust
Просмотров 8588 месяцев назад
This video demonstrates arbitrary buffer overreads in safe Rust code, using a Spectre V1 attack. The video give background on Rust and its security measures, then dives into the Spectre V1 attack and its Rust safe gadget, and finally a live demo is performed.
TrustForge Programming Tutorial
Просмотров 1259 месяцев назад
This video is a video from the TrustForge programming series. It is a short tutorial on TrustForge-based privacy-enhanced programming. TrustForge is a next-generation secure computation framework for Amazon AWS and Microsoft Azure that supports "encrypted computation" and "safe data releases". In this video, I take a simple LeetCode medium program and convert it to utilize always-encrypted comp...
TrustForge Privacy Enhanced Surveillance
Просмотров 1139 месяцев назад
Did you ever wonder who might be watching you through your home's internet security cameras? In this short video, I discuss the extreme privacy risks of today's home security cameras, and then show a demo of a system performing video surveillance on encrypted data that the service provider can never see, even if they hack their own system or code. The demo system is built using "secure computat...
TrustForge Zero-Trust Secure Biometrics Authentication
Просмотров 12410 месяцев назад
In this video, I build and demonstrate a secure biometrics database. Using TrustForge secure computation, the demo system queries a fingerprint database, using minutiae-based fingerprint matching, to authenticate a user of a computer. But unlike existing biometric authentication systems, the TrustForge demo does this with encrypted fingerprints and encrypted computation. Using TrustForge's "sec...
TrustForge Zero-Trust Orbital Collision Detection
Просмотров 11810 месяцев назад
Will these two satellites hit each other? In this TrustForge privacy-enhanced computation demo, we develop a cryptosystem that allows to untrusting owners of spy satellites to encrypt their orbital parameters and share them with the TrustForge enclave, where they can be safely analyzed to determine of they will collide. To learn more about the TrustForge Secure Computation Platform for AWS and ...
HotChips 2023 - TrustForge Poster Pitch
Просмотров 9110 месяцев назад
This video details the TrustForge Cryptographically Secure Enclave, which is made by Agita Labs and deployed for commercial use in Microsoft Azure and Amazon AWS. This poster was presented at the HotChips 2023 conference in August 2023, by Todd Austin, who is one of the co-founders of Agita Labs. For more information on TrustForge, visit agitalabs.com
Hardware Security Tutorial - Part 6 - Emerging Security Protections
Просмотров 58810 месяцев назад
A hardware security tutorial presented in a six-part video series. By: Prof. Todd Austin @ University of Michigan Part #1: Building Secure Hardware and Software: ruclips.net/video/6EtTyaI2TKc/видео.html - On why computer security and privacy should be a concern for hardware designers Part #2: Security Basics: ruclips.net/video/YToSq0yM5Aw/видео.html - Cryptography, hashing, and signatures Part ...
TrustForge Zero-Trust Silicon Fabrication Demo
Просмотров 17510 месяцев назад
One of the key concerns of hardware security today is how to establish trust in silicon manufacturing. Techniques such as logic locking, camouflaging, and reconfigurable fabrics work to establish trust in the underlying silicon, to prevent chip overproduction, reverse engineering or Trojan backdoors. In this video, I demonstrate how Agita Labs TrustForge Zero-Trust Secure Computation can help e...
Hardware Security Tutorial - Part 5 - Hardware and Software Security Defenses
Просмотров 79511 месяцев назад
A hardware security tutorial presented in a six-part video series. By: Prof. Todd Austin @ University of Michigan Part #1: Building Secure Hardware and Software: ruclips.net/video/6EtTyaI2TKc/видео.html - On why computer security and privacy should be a concern for hardware designers Part #2: Security Basics: ruclips.net/video/YToSq0yM5Aw/видео.html - Cryptography, hashing, and signatures Part ...
TrustForge-Enabled Cryptographically Secure E2EE Content Scanning without Sacrificing User Privacy
Просмотров 11311 месяцев назад
This video dives into privacy risks for today's end-to-end encrypted (E2EE) systems, when governments try to force backdoors into these systems to address child endangerment and other public safety concerns. It also demonstrates a solution. A way to ease the tension between privacy and public safety is through the use of cryptographically secure computation frameworks. Check out our demo of Tru...
Hardware Security Tutorial - Part 4 - Side Channel Attacks
Просмотров 2 тыс.11 месяцев назад
A hardware security tutorial presented in a six-part video series. By: Prof. Todd Austin @ University of Michigan Part #1: Building Secure Hardware and Software: ruclips.net/video/6EtTyaI2TKc/видео.html - On why computer security and privacy should be a concern for hardware designers Part #2: Security Basics: ruclips.net/video/YToSq0yM5Aw/видео.html - Cryptography, hashing, and signatures Part ...
Hardware Security Tutorial - Part 3 - Hardware and Software Attacks
Просмотров 1,5 тыс.11 месяцев назад
A hardware security tutorial presented in a six-part video series. By: Prof. Todd Austin @ University of Michigan Part #1: Building Secure Hardware and Software: ruclips.net/video/6EtTyaI2TKc/видео.html - On why computer security and privacy should be a concern for hardware designers Part #2: Security Basics: ruclips.net/video/YToSq0yM5Aw/видео.html - Cryptography, hashing, and signatures Part ...
Hardware Security Tutorial - Part 2 - Security Basics
Просмотров 2,1 тыс.11 месяцев назад
A hardware security tutorial presented in a six-part video series. By: Prof. Todd Austin @ University of Michigan Part #1: Building Secure Hardware and Software: ruclips.net/video/6EtTyaI2TKc/видео.html - On why computer security and privacy should be a concern for hardware designers Part #2: Security Basics: ruclips.net/video/YToSq0yM5Aw/видео.html - Cryptography, hashing, and signatures Part ...
Hardware Security Tutorial - Part 1 - Building Secure Hardware and Software
Просмотров 4,7 тыс.11 месяцев назад
A hardware security tutorial presented in a six-part video series. By: Prof. Todd Austin @ University of Michigan Part #1: Building Secure Hardware and Software: ruclips.net/video/6EtTyaI2TKc/видео.html - On why computer security and privacy should be a concern for hardware designers Part #2: Security Basics: ruclips.net/video/YToSq0yM5Aw/видео.html - Cryptography, hashing, and signatures Part ...
Deep Reinforcement Learning Applied to the Snake Video Game
Просмотров 642Год назад
Deep Reinforcement Learning Applied to the Snake Video Game
Lecture on Microarchitectural Side-Channel Attacks
Просмотров 1,1 тыс.Год назад
Lecture on Microarchitectural Side-Channel Attacks
The Zen of Research - Tips for New Researchers
Просмотров 7 тыс.Год назад
The Zen of Research - Tips for New Researchers
IEEE SEED 2022 Keynote: From Security to Privacy...
Просмотров 682Год назад
IEEE SEED 2022 Keynote: From Security to Privacy...
Todd Austin - Tutorial: Microarchitectural Side Channel Attacks
Просмотров 1,5 тыс.2 года назад
Todd Austin - Tutorial: Microarchitectural Side Channel Attacks
AURA 2021 Promo Trailer
Просмотров 4002 года назад
AURA 2021 Promo Trailer
VIP-Bench Presentation at IEEE SEED 2021 (by Todd Austin & Lauren Biernacki)
Просмотров 1842 года назад
VIP-Bench Presentation at IEEE SEED 2021 (by Todd Austin & Lauren Biernacki)
HotChips 2021 Presentation on Morpheus II - The Director's Cut
Просмотров 7913 года назад
HotChips 2021 Presentation on Morpheus II - The Director's Cut
Robust System Design Lecture 2021-06-09
Просмотров 2933 года назад
Robust System Design Lecture 2021-06-09
VIP Benchmark Suite Introduction by Lauren Biernacki @ UMich
Просмотров 4083 года назад
VIP Benchmark Suite Introduction by Lauren Biernacki @ UMich
May 2021 - MEST Center Webinar - Todd Austin - "Toward Durable System Security"
Просмотров 2203 года назад
May 2021 - MEST Center Webinar - Todd Austin - "Toward Durable System Security"
BlackHat 2012 Fault-Based RSA Attack
Просмотров 1853 года назад
BlackHat 2012 Fault-Based RSA Attack
Preparing for a Post Moore's Law World (MICRO-2015 Keynote)
Просмотров 3843 года назад
Preparing for a Post Moore's Law World (MICRO-2015 Keynote)
From Security to Immunity - Todd Austin (UC-Davis ECE Invited Lecture)
Просмотров 2,3 тыс.3 года назад
From Security to Immunity - Todd Austin (UC-Davis ECE Invited Lecture)
IEDM 2020 Short Course: Memory For Secure Computing (Part 2)
Просмотров 2793 года назад
IEDM 2020 Short Course: Memory For Secure Computing (Part 2)

Комментарии

  • @user-rm1mx1di1m
    @user-rm1mx1di1m 2 месяца назад

    Very interesting! Thank you professor!!

  • @user-ob3il5ds4b
    @user-ob3il5ds4b 2 месяца назад

    Very insightful.

  • @victorcruceru3246
    @victorcruceru3246 3 месяца назад

    buffer = read_input(); is a piece of odd C code. Probably incoorect. Better C code: read_code(&buffer[0]);

  • @bradrickrobinson7452
    @bradrickrobinson7452 3 месяца назад

    Thank you for putting out these videos about the untold technology of hardware security. I'm currently going through the VETS-HASTE Program sponsored by Veterans Florida and University of Florida and your videos are most definitely shedding some light on the situation. My questions to you are: What is a typical day for a person in hardware security? How can you keep steady work in this type of technology field? Thanks again for all that you do!!!

  • @MallelaSitaramaChandrasekhar
    @MallelaSitaramaChandrasekhar 4 месяца назад

    Do you have a playlist for secure boot process, using the above knowledge ? Or any youtube links that have dealt with the secure boot fundamentals and its deployment in the industry ?

  • @euro_life_4all
    @euro_life_4all 4 месяца назад

    Dear Sir, could you please attach the presentation pdfs or ppt format along with video. in the description box, that would be of great help.

  • @braanajjar6530
    @braanajjar6530 7 месяцев назад

    hi prof Todd, i am a jordanian student working on an archticure project and i need to use simplescaler tool version 3, but no matter how hard i search for, there are some files that i cant obtain such as simpleutils-990811.tar.gz and other files, the only file i can reach is simplesim-3.0 thanks to someone who archived it as a github repo, if you can point me to where i can obtain those files related to version 3, i would be very grateful professor

  • @patriciat.8121
    @patriciat.8121 7 месяцев назад

    29:26

  • @neginmahani1406
    @neginmahani1406 8 месяцев назад

    Todd, you're an absolute superstar! Your insights and teaching style shine brightly, inspiring countless minds like mine. Thank you for being such an exceptional mentor!

  • @porglezomp7235
    @porglezomp7235 8 месяцев назад

    Hi Todd, I took EECS 370 a few years back, it was fun to see this video from you shared in a Rust slack channel at work. I’m curious how much existing LLVM-level mitigations help here, does adding `-C llvm-args='--x86-speculative-load-hardening'` to the compilation flags help thwart this already?

  • @canying0913
    @canying0913 9 месяцев назад

    I have watched this repetitively for about 6 months and it always calms me down whenever I am closer to mental meltdown due to up and downs on my research life. Thank you Professor Austin!

    • @prof.todd.austin
      @prof.todd.austin 9 месяцев назад

      This comment made my week! Ty! I'm glad the video was helpful!

  • @ZaidEngComp
    @ZaidEngComp 9 месяцев назад

    thanks for sharing , we appreciates if you share with us the materials

  • @neginmahani1406
    @neginmahani1406 10 месяцев назад

    I really enjoyed the video, thanks, Tod!

  • @lovelymemes9179
    @lovelymemes9179 10 месяцев назад

    Thank you professor for your valuable insights!!

  • @mpetry912
    @mpetry912 10 месяцев назад

    this is super interesting !

  • @srimanthtenneti6425
    @srimanthtenneti6425 10 месяцев назад

    This is really cool 👏

  • @LydellAaron
    @LydellAaron 11 месяцев назад

    This was an awesome talk. Researcher tips and breaking rules in research style. What is the best way to access research papers as a civilian/non-student? Thank you!

  • @joelmandebi7212
    @joelmandebi7212 11 месяцев назад

    Another great discussion. Thanks Prof. Austin

  • @racim.boussa
    @racim.boussa 11 месяцев назад

    Later i'll show you how to get past Rust 🔥🔥

  • @rohitmittal42
    @rohitmittal42 11 месяцев назад

    When will you be completing the 6 videos

    • @prof.todd.austin
      @prof.todd.austin 11 месяцев назад

      I'll be releasing new videos in the 6-part series at about 1 video every 3-4 days, please subscribe to this channel and RUclips will notify you when the later episodes go live. Thanks for watching!

  • @rohitmittal42
    @rohitmittal42 11 месяцев назад

    Awesome. Thank you! I was always confused by security and privacy.

  • @junaidamjad5053
    @junaidamjad5053 11 месяцев назад

    Great explanation professor, I do have one question regarding producing the factors of a number originally from which the number was produced, is it really possible? Even if quantum computers gave us the computation power for doing all this computation but is not our solution space is infinite possible solution, so how do we find the exact factors which were used to produce the number in first place? I don't have knowledge of working of these ciphers so kindly do correct me if I'm approaching it in a wrong way, thanks.

    • @prof.todd.austin
      @prof.todd.austin 11 месяцев назад

      Thanks for the question! The factoring solution space is not infinite, but it is exponential (or worse) with the number of bits in the keys. Here's an almost 2000 year old algorithm that will factor any number into its prime factors, given enough time to compute: en.wikipedia.org/wiki/Sieve_of_Eratosthenes. The challenge with conventional computers is that the key size for RSA today is 2048 or 4096 bits, so you are looking at O(2^2048) size search spaces, which is unsearchable in anyone's lifetime (and the reason no one is breaking the RSA keys directly). One of the foundational algorithms for quantum computers is Shore's algorithm (en.wikipedia.org/wiki/Shor%27s_algorithm), which in the best case can factor large numbers O(log 2^2048) which is roughly O(~600), a much more achievable complexity! Today's quantum computers are still too immature to factor large numbers, but as the technology improves, there may someday come a time when a quantum computer can brute force discover an RSA private key, which would be pure chaos for the internet because anyone with a quantum computer could pose as anyone else on the internet (and create their digital signatures, etc...), so cryptographers are busy at work today to develop asymmetric key ciphers that utilize one-way functions that are not amenable to any known quantum algorithms.

  • @joelmandebi7212
    @joelmandebi7212 11 месяцев назад

    Very insightful discussion. Thanks Prof Austin.

  • @steen1video
    @steen1video 11 месяцев назад

    Excellent points! I encountered many of them in my PhD journey😀

  • @leoudeji
    @leoudeji 11 месяцев назад

    Thanks alot Prof. Austin for taking the time to share these tips.

  • @schoolofthought.
    @schoolofthought. Год назад

    Professor Thanks a lot for sharing

  • @Hayat-bk3bv
    @Hayat-bk3bv Год назад

    Thanks so much for sharing . I'm actually "Faking it till I make it" and I believe I will make it :)

  • @samuelwozab2500
    @samuelwozab2500 Год назад

    Hello , How can I apply for AURA 2023 research program? am currently 4th year undergraduate mechanical engineering student at Addis Ababa institute of Technology. please contact me at my email address: samuelwozab2030@gmail.com

  • @MohamedIbrahim-nq4oh
    @MohamedIbrahim-nq4oh Год назад

    Prof. Austin: Thanks a lot for sharing this great video!

  • @moloned
    @moloned 2 года назад

    Sounds like a great tool especially when combined with edge AI and compute

  • @Basil-the-Frog
    @Basil-the-Frog 3 года назад

    Valgrind is pronounced val-grinned.

  • @GeorgWilde
    @GeorgWilde 3 года назад

    "Morpheus attack deterctors discern normal code from malicious code, via undefiend semantics" - So you have solved halting problem? :-D

  • @mehdis.7404
    @mehdis.7404 3 года назад

    very insightful, thanks Todd for sharing! coarse grained reconfigurable architecture comes to my mind that can be customized for different tasks

  • @leonardotoshinobukimura2955
    @leonardotoshinobukimura2955 3 года назад

    it is amazing!!

  • @jamesclarity1077
    @jamesclarity1077 3 года назад

    Great project

  • @jamesclarity1077
    @jamesclarity1077 3 года назад

    "No one has broken AES". Quantum computing. Hold my beer

    • @Jasruler
      @Jasruler 3 года назад

      AES-256 is not going to be broken by a quantum computer for a very long time.