Investigating Energy and Security Trade-offs in the Classroom With - - PowerPoint PPT Presentation

investigating energy and security trade offs in the
SMART_READER_LITE
LIVE PREVIEW

Investigating Energy and Security Trade-offs in the Classroom With - - PowerPoint PPT Presentation

Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed Peter A. H. Peterson Digvijay Singh William J. Kaiser Peter L. Reiher { pahp, reiher } @cs.ucla.edu digvijay@ucla.edu kaiser@ee.ucla.edu 4th Workshop on


slide-1
SLIDE 1

Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed

Peter A. H. Peterson Digvijay Singh William J. Kaiser Peter L. Reiher

{pahp, reiher}@cs.ucla.edu digvijay@ucla.edu kaiser@ee.ucla.edu

4th Workshop on Cyber Security Experimentation and Test

August 8, 2011

slide-2
SLIDE 2

Overview

We present a new measurement tool and describe its use for an undergraduate research seminar investigating energy and security tradeoffs.

◮ Introducing the Atom LEAP ◮ Undergraduate Research: Security vs. Energy ◮ Lessons Learned

slide-3
SLIDE 3

Introducing Atom LEAP

slide-4
SLIDE 4

Introducing Atom LEAP

The Atom LEAP is an energy measurement platform which is...

◮ Component Level (HDD, RAM, CPU, USB, PSU) ◮ High granularity (10,000 floating point samples per second) ◮ Event Synchronized with Energy Calipers

The LEAP is flexible and portable:

◮ “Off the shelf” hardware ◮ Open-source/Free Software stack ◮ “Easy” to construct (Even I can do it!) ◮ “Inexpensive” — about $1,500 (mostly the DAQ) ◮ Self-contained

slide-5
SLIDE 5

Atom LEAP Components

◮ Intel Atom N330 and Motherboard ◮ Risers and sense resistors ◮ National Instruments USB DAQ ◮ Synchronization instrumentation ◮ Software stack

slide-6
SLIDE 6

Atom LEAP: Exploded View

slide-7
SLIDE 7

Synchronized Energy Calipers

Energy calipers allow energy measurement of very small time spans.

◮ A sync signal is linked to the CPU’s Time Stamp Counter

(TSC)

◮ This signal is sampled while workload is measured ◮ Workload instrumentation records the TSC before and after

an event with inline assembly or a command line utility

◮ Post-hoc analysis identifies energy samples taken during

named events

◮ Data can be averaged or viewed as a time series

slide-8
SLIDE 8

Synchronized Energy Calipers

Calipers are available for user and kernel code:

◮ Kernel prints TSC values to the syslog ◮ User code prints TSC values to a log file ◮ All logging is done to a RAM disk to reduce overhead

(although this obviously increases RAM usage)

slide-9
SLIDE 9

Software Stack

Familiar and powerful environment:

◮ Runs on Linux ◮ Can test virtually any software with minimum instrumentation

◮ Inline assembly compiled into source code ◮ Or, getticks utility executed between binary workloads

◮ Testing scripts facilitate consistent repetitions and batched

jobs with reboots

◮ Report format named by workload, separated into job

components, and easily imported into analysis tools

slide-10
SLIDE 10

Portable and Flexible Framework

The LEAP model is applicable to a wide variety of hardware. It requires only:

◮ Stable, accessible clock source like a TSC ◮ Instrumentation harness (wires, resistors, and DAQ) ◮ Software tools – automating workloads, scripting, etc.

We have already constructed:

◮ Atom LEAP ◮ Mobile LEAP ◮ DSP LEAP ◮ Dual Xeon LEAP

slide-11
SLIDE 11

Active Testing and Development

Ongoing research:

◮ analysis of self-measurement cost ◮ analysis of sample rate effects ◮ improved instrumentation code ◮ calibration workloads

Stay tuned for information about a pilot program.

slide-12
SLIDE 12

Undergraduate Research with Atom LEAP

slide-13
SLIDE 13

Undergraduate Research with Atom LEAP

Case study:

◮ UCLA CS 188: Undergraduate Research Seminar ◮ 25 graduates and undergraduates ◮ 10-week quarter ◮ Security-oriented projects ◮ Atom LEAP

Our goals:

◮ Using LEAP to investigate Security vs. Energy Trade-offs ◮ Teach performance measurement and analysis ◮ Interactive group meetings instead of lectures ◮ Emphasis on overall process and experience rather than novel

results

slide-14
SLIDE 14

Introducing the Atom-Powered zPad by Banana Computer

As employees of Banana Computer’s Development Lab, students were assigned to workgroups performing introductory investigations into five energy and security related concept areas for the new device:

◮ Disk Encryption ◮ Network Encryption ◮ Power/Security Posture ◮ Virtualization/Isolation ◮ Offloading Computation

I’ll briefly discuss each area, along with some limited quantitative results.

slide-15
SLIDE 15

But First, A Disclaimer

The following nuggets are meant more as teasers than solid gold “results.” Several issues combined to affect outcomes:

◮ Experiment design and workload choice ◮ Time constraints of quarter ◮ Varying expertise of students ◮ Experimental practice

We’ll discuss some of these issues in the Lessons Learned portion

  • f the talk.
slide-16
SLIDE 16
  • 1. Disk Encryption

◮ How much energy does Full Disk Encryption cost? ◮ Should it be done in hardware or software?

FDE disk did not arrive in time, so students investigated whether compression could reduce the cost of disk encryption.

◮ Compared various filesystems and compression algorithms ◮ Against various workloads

slide-17
SLIDE 17
  • 1. Disk Encryption: Food for thought

60 80 100 120 140 160 180 200 CPU (J) HDD (J) RAM (J) Joules Hardware Component Energy Use of Kernel String Search by Compression Algorithm None LZO gzip xz

Does compression save energy? If so, how much?

◮ Compression significantly reduces cost of encrypted filesystem ◮ Middle ground algorithm (gzip) is best

slide-18
SLIDE 18
  • 2. Network Encryption

◮ How much does encryption cost change by algorithm? ◮ What if we chose algorithm based on current threat? ◮ Students chose to engineer cipher changing in SSH ◮ Workloads included basic microbenchmarks as well as

expect-scripted interactive sessions and file transfers.

slide-19
SLIDE 19
  • 2. Network Encryption: Food for thought

0.1 0.2 0.3 0.4 0.5 0.6 0.7 CPU (J) HDD (J) RAM (J) Joules Hardware Component Energy Use of scp Encryption Cost by Cipher 3DES AES-128 Blowfish

Does SCP cipher choice have an energy cost?

◮ Both AES and Blowfish are significantly cheaper than 3DES ◮ Blowfish is the winner (but this was only significant for RAM)

slide-20
SLIDE 20
  • 3. Sandboxing

◮ How much energy do various sandboxing techniques cost?

◮ VirtualBox ◮ User-Mode Linux ◮ chroot jails

◮ What isolation is provided by each technique? ◮ Students ran file utilities and GUI workloads scripted with the

Linux Desktop Testing Project (LDTP)

slide-21
SLIDE 21
  • 3. Sandboxing: Food for thought

The Atom N330 Does not have hardware virtualization support!

◮ 60-600% penalty to use VirtualBox! (Even with kernel plugin

and multiple cores)

◮ chroot jails inexpensive, but of limited value ◮ Students could not get User-Mode Linux to work

slide-22
SLIDE 22
  • 4. Dynamic Power/Security Posture

◮ What if OS added energy dimension to Security and Data

Sensitivity “zones”?

◮ In high-security areas, the zPad could cut back on paranoid

security

◮ Or reschedule latency-tolerant tasks for later ◮ Would this save energy? ◮ What would such a facility look like?

slide-23
SLIDE 23
  • 4. Power/Security Posture: Food for thought

500 1000 1500 2000 2500 3000 CPU (J) HDD (J) RAM (J) Joules Hardware Component Energy Savings of Omitting Scan Option in ClamAV All No Archives No Images No Algorithms

Energy-aware virus scanning

◮ Students created the PowerSecZone daemon and API ◮ Modified ClamAV to behave differently based on status ◮ Number of files scanned more significant (in their test) than

content or algorithm

slide-24
SLIDE 24
  • 5. Offloading Security

◮ Can the zPad extend battery life by offloading security tasks? ◮ Or does the offloading cost more than it saves? ◮ Tested email signing, bittorrent, and more

slide-25
SLIDE 25
  • 5. Offloading: Food for thought

5 10 15 20 25 30 CPU (J) HDD (J) RAM (J) NETWORK (J) Joules Hardware Component Energy Savings of Offloading RSA-Signature of 256k Email No Offloading Offloading

Offloading cryptographic signing to a compute server via WiFi

◮ Saved a tremendous amount of power — around 40-50% ◮ Even while paying to encrypt wifi with SSH ◮ Not just shorter runtime – disk, RAM, and net (USB) used

less watts

slide-26
SLIDE 26

Lessons Learned

The course and Atom LEAP are a success, but there is much work to do!

◮ Course design and management ◮ Research value vs. practical issues ◮ Statistics and experimental practice ◮ LEAP Development

slide-27
SLIDE 27

Lessons: Course Design

◮ Atom LEAP technology worked really well ◮ Designing projects and assigning students was a good choice ◮ Group meetings a lot like actual grad school experience ◮ Five different groups require a lot of oversight

slide-28
SLIDE 28

Lessons: Research Value vs. Practical Issues

◮ Help students prepare to succeed despite major setbacks ◮ Decide if you want rock solid results or broader educational

experience

◮ Quarters are short and students (allegedly) have other classes

slide-29
SLIDE 29

Lessons: Statistics and Experimental Practice

◮ The class definitely taught why evaluation is hard ◮ We worked hard to try and control parameters and use real

software

◮ Not all students learned good experimental practice and this

wasn’t obvious until it was too late

◮ Be explicit about experimental requirements:

◮ require students to script workloads for repeatability ◮ require analysis of workload scripts with students (not just

experimental plan)

◮ require statistical analysis, don’t just recommend it

◮ Test early, test often!

slide-30
SLIDE 30

Atom LEAP Pilot Program

We are improving LEAP technology and are preparing a distribution of the platform so that other researchers can build their own. We’re creating documentation, packaging our tools, and preparing some community resources. To help iron out some kinks, we are considering a small pilot program. Interested? Email: pahp@cs.ucla.edu

slide-31
SLIDE 31

Acknowledgments

◮ Intel, NSF ◮ Sean Peisert (shepherd) ◮ CSET committee, reviewers, USENIX ◮ Dr. William J. Kaiser and Digvijay Singh (primary LEAP

developers)