Hardware Attacks and Security Education

被引:0
作者
Lo, Dan Chia-Tien [1 ]
Qian, Kai [1 ]
Chen, Wei [2 ]
机构
[1] Kennesaw State Univ, Dept Comp Sci, Marietta, GA 30060 USA
[2] Tennessee State Univ, Dept Comp Sci, Nashville, TN 37209 USA
来源
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2 | 2016年
关键词
hardware attacks; information security; computer science; education;
D O I
10.1109/COMPSAC.2016.128
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper aims to develop and evaluate information assurance and security learning materials on hardware/firmware attacks for undergraduate education. Topics include firmware worms, application programming interface, and operating systems. Computing devices are equipped with firmware that performs basic hardware testing and loads operating systems. According to hardware rooted security guidelines, the following fundamental security primitives are required: roots of trust, an application programming interface (API) to the platform, and a policy enforcement engine. We believe it is important to verify these primitives' integrity with hands-on experiments to educate next generation computer experts. The learning material has been implemented and evaluated in an undergraduate Computer Architecture course using Intel's Chipsec to validate PC BIOS in terms of known vulnerabilities.
引用
收藏
页码:253 / 257
页数:5
相关论文
共 14 条
[1]  
Andrus J., 2012, P ACM SIGCSE 12 FEB
[2]  
[Anonymous], 2015, GARTN SAYS GLOB DEV
[3]  
[Anonymous], GARTN SAYS TABL SAL
[4]  
Carlson A., 2002, AUTHENTIC LEARNING W
[5]  
Cooper D., SPECIAL PUBLICATION, V800-147
[6]  
Fu H., 2008, 0736877 NSF CCLI
[7]  
Grimes Rodger A., 2012, WHAT DO YOU NEED KNO
[8]  
Guha R., 2012, 0837320 NSF CCLI
[9]  
Hussain Farzan, 2015, FIRMWARE WORM PERMAN
[10]  
Kurkovsky Stan, 2009, SIGCSE Bulletin, V41, P44, DOI 10.1145/1539024.1508881