90 likes | 242 Views
Beyond Authentication Don’t Trust, Just Verify. Eran Tromer. BRCMF Inaguration Ceremony 21 Nov 2013. Talking about…. Chinese counterfeit chips causing military hardware crashes […]
E N D
Beyond AuthenticationDon’t Trust, Just Verify Eran Tromer BRCMF Inaguration Ceremony 21 Nov 2013
Talking about… • Chinese counterfeit chips causing military hardware crashes • […] • Component failure reports from defense contractors worldwide, including Boeing, Raytheon, BAE, Northrop Grumman, and Lockheed […] and investigations have turned up a significant number of counterfeit parts, sometimes installed in mission-critical systems. • Principles • trusting devices • Things • People authenticating users
Side-channel leakageEven if the software and hardware function correctly… probing optical power electromagnetic acoustic microarchitecture
Talking about… policies andalgorithms • Principles • trusting devices • Things • People authenticating users
The challenge Create general techniques to ensure integrity and confidentialityin computation done bycomponents and parties that are untrustworthy, faulty, leaky&malicious. The approach: modern cryptography
Integrity of computation: SNARKs(SuccintNoninteractive Arguments of Knowledge) v=DB[x]; w=func(v,y); return z; x DB,y Verify z proof Current prototype: The correct execution of arbitrary C programs can be verified in 5 milliseconds using 230-byteproofs.
Integrity via Proof-Carrying Data m3 m1 m6 mout m4 m2 m7 m5 • Diverse network, containing untrustworthy parties and unreliable components. • Impractical to verify internals of each node, so give up. • Enforce only correctness of the messages and ultimate results.
Integrity via Proof-Carrying Data (cont.) Every message is augmented with a proof attesting to its compliance” with a prescribed policy. Compliance can express any property that can be verified by locally checking every node. Proofs can be verified efficiently and retroactively. m33 m11 m66 moutout m44 m22 m77 m55
Proof-Carrying DataIntegrity for distributed computation Implementation underway.Seeking practical impact.