Secure Processor Microarchitecture


With the growing threat of cyber attacks, the prominence of processor microarchitecture as an efficient means to address the threat has grown immensely. On the other hand, computer hardware is often at the epicenter of a range of new threats that exploit vulnerabilities inherent in the processor design. This course explores the good and the bad side of computer hardware in the cyber security context.

This course comprise of two parts.

Part 1. Attacks based on vulnerabilities in the computer hardware

  • Power side-channel attacks

  • Fault Attacks

  • Micro-architectural attacks

Part 2: Hardware centric strategies to improve computer security

  • Trusted Execution Environments

  • Trusted platform modules

  • Malware detection from hardware

Instructor

Chester Rebeiro

TAs

Prerequisites

computer organisation and architecture

Logistics

Classes will be held from 25/Feb/2021 in Slot A.

  • Monday : 8:00 - 8:50 AM

  • Tuesday : 12:00 - 12:50 PM (will be used for Lab and Tutorials)

  • Thursday: 11:00 - 11:50 AM

  • Friday: 10:00 - 10::50 AM


We will be using Microsoft Teams for communication. Please create accounts with your smail.iitm.ac.in email ids.

sLIDES and NOTES