RISC V and Security: How, When and Why
CHES 2019 @ Atlanta 08/26/2019
Helena Handschuh Rambus Security Technologies Fellow RISCV Security Standing Committee Chair
RISC V and Security: How, When and Why Helena Handschuh Rambus - - PowerPoint PPT Presentation
RISC V and Security: How, When and Why Helena Handschuh Rambus Security Technologies Fellow RISCV Security Standing Committee Chair CHES 2019 @ Atlanta 08/26/2019 Outline RISCV Foundation Security Standing Committee Creation and
CHES 2019 @ Atlanta 08/26/2019
Helena Handschuh Rambus Security Technologies Fellow RISCV Security Standing Committee Chair
2
3
processor innovation through open standard collaboration.
http://riscv.org
4
processor innovation through open standard collaboration.
http://riscv.org
5
under the following license: c 2010–2017 Andrew Wate term rman, n, Yunsup up Lee, David d Patt tterson, n, Krs rste Asano novi´c. Creative Commons Attribution 4.0 International License.
“The RISC-V Instruction Set Manual, Volume I: User-Level ISA, Document Version 2.2”, Editors Andrew Waterman and Krste Asanovi´c, RISC-V Foundation, May 2017.
6
7
“The RISC-V Instruction Set Manual, Volume I: User-Level ISA, Document Version 20190608-Base-Ratified”, Editors Andrew Waterman and Krste Asanovi ́c, RISC-V Foundation, March 2019. Creative Commons Attribution 4.0 International License.
8
9
“The RISC-V Instruction Set Manual, Volume II: Privileged Architecture, Document Version 20190608-Priv-MSU-Ratified”, Editors Andrew Waterman and Krste Asanovi ́c, RISC-V Foundation, June 2019.
10
11
cores/
have passed the in in-develo lopment t RISC-V compliance suite.
12
ulators
ject toolcha hain
bugg gging ng
piler ers s and d librar aries es
ader ers s and d moni nitors
d OS kernel nels
piler ers s and d runtimes es for other her langua uages es
13
14
15
Join In Efforts”
y is one ne of the he fund undamental issues s in n our ur conn nnec ected ed worl
community is committed to pushing the industry forward through innovative approaches and new thinking to addr ddress ss existing and nd emer erging thr hrea eats” (Helena)
new compute e pl platfor
hat ha has s forma rmal met ethod
s at its foun undation
r proc proces essor sor corr rrectness ess and nd secu curity,” …“RISC-V is a simple, free and open ISA that is an ideal vehicle for research in form rmally y assured d secu curity and nd secure ha hardware e de develop
security applications.” (Joe Kiniry)
16
chair: Helena Handschuh, Rambus vice-chair: Joe Kiniry, Galois website: https://lists.riscv.org meetings roughly every other week, alternating between “Speaker Program” and “Business Meeting”
17
hart rter er:
propose se ISA ex extensi sions s to to the he vector r ex exten ensi sion
he sta standardiz ized ed and nd secure ex exec ecutio ion of
pop popula lar r cryptog
ithms. .
sure tha hat pro processo sor r imp mple lementers s are re abl ble to to sup upport rt a wi wide e ra range e of
perf rformance e and nd sec ecuri rity ty lev evel els s the he comm
will ll crea eate a ba base se and nd an n ex exten ended ed spec pecifi ificati tion. .
he ba base se wi will ll be be comp
rise sed of
nstru ructi tions tha hat t are e us usefu ful l for
he accele lerati tion
algorit ithms.
he ext exten ended ed spec pecifi ificati tion
will ll inc nclu lude grea eater r fun uncti tionali lity ty, re rese serv rve e enc ncod
more e alg lgorit rithms, s, and nd wi will ll fa facili litate imp mproved sec ecurit ity of
exec ecutio ion and nd hi higher pe perf rform rmance. e.
he scope e wi will ll inc nclu lude sy symmetr tric ic and nd asy symmetric ic cryptographic ic alg lgorit rithms and nd re rela lated pri primiti tives es suc uch as me mess ssage di digests.
he com
ittee e wi will ll also so ma make ISA pro proposa sals ls re regardin ing the he us use e of
random bi bits ts and nd sec ecure key ey ma management.
18
19
Char arter er:
efine e an archi hitec ectur ure spec ecific fication
ppor
ed ex exec ecution
nviron
ent for RISC-V proces esso sors
de necess essary implem emen entation gu guide deline nes and/ d/or recommend ndations ns to assi sist hardw dwar are e devel eloper pers s to real alize e the e spec ecific fication
nabl ble e the e devel elopm pment of necess essar ary compo pone nents, s, such h as compi piler er, simul ulation n model del, hardw dwar are, e, and d softw ftwar are compo ponen ents s to suppo pport the e speci ecific fication
20
management, certs, revocation, attestation
21
22
23
Gern rnot Heis iser, Data61 1 on
ing Attacks s and nd Aug ugmented ISA
ee, Berk erkeley on
e Key eystone e proj roject (TEE fra ramework)
eranto
ing Attack Miti itigatio ion Idea deas
Geater er, Tha hale les on
nsights ts into
tzone and nd TEEs s
Nicole le Fern rn, Tort
ic on
ity-Orie iented Ver erific ficati tion
s
iel l Ge Genkin in on
eshadow
tefan Mangard, IAIK K Gr Graz on
extensi sion
CFI, sec ecure me memory ry acces ess) s)
Ben Marshall, l, Br Bris istol l on
rypto ISA ex exten ensi sions
name e he here
24
25
https://riscv.org/2019/07/risc-v-softcpu-core-contest/
26
27
28
29
Some existing proposals:
30
ISA related?
31
32
Call to action!
33