SlideShare a Scribd company logo
Security for The Machine: By Design
James Salter, Research Manager
Security and Manageability Lab
2014
DNS Logging
Trafodion
Location Aware
1967
Cesium-beam atomic clock
1966
Light-Emitting Diode (LED)
1972
Pocket Scientific
Calculator
1975
Standard for
Interface Bus
1980
Office Laser
Printer
1984
Inkjet Printer
1986
3D graphics
workstations
1980
64-channel
Ultrasound
1989
Digital Data
Storage Drive
1994
64-bit
architecture
1999
Molecular
Logic Gate
2001
Utility Data
Center
2002
Rewritable DVD
for standard
players
2003
Smart Cooling
2005
Virus Throttle
2010
ePrint
2011
MagCloud
2011
3D Photon
Engine
2011
StoreOnce
2012
StoreAll
2013
Threat Central
2013
SureStart
2014
3D Printing Technology
Innovation is our legacy and our future
1966
1968
Programmable
Desktop Calculator
1986
Commercialized
RISC chips
2008
Memristor
discovered
2012
OpenFlow
switches
2013
HP Moonshot
2015
Distributed R
HP Labs
Innovation is our legacy and our future
The Past 60 Years
4
1950s 1960s 1970s 1980s 1990s 2000s Today
5
The Machine
6
I/O
Copper
7
Copper
8
Copper
9
From processor-centric computing…
10
Memory
Memory
Memory
Memory
SoC
SoC
SoC
SoC
SoC
SoC
SoC
SoC
Memory
+
Fabric
…to Memory-Driven Computing
Security challenges
11
Scale
New architecture
Which control points?
Performance bottleneck
Resource constraints
Principles
Security by design, not as an afterthought A secure foundation for applications
12
The Machine security framework
13
The first computer with security
built-in from the ground up
Data always protected:
in use, in flight and at rest
Secure boot and firmware
Run time monitoring
Access control
Low energy encryption
Protect
Giving The Machine the ability to
protect itself, even against
completely unknown threats
Compromised components
Firmware and kernel tampering
Runtime malware monitoring
Monitoring for data leakage
Detect
Always safe, always
recoverable, without sacrificing
performance
Recovery at the firmware layer
OS, application, and data recovery
Systematic recovery at scale with
minimal human intervention
Recover
Protect: Access control at different layers
14
Hardware
Application Thread
Data Data Data
Application Thread
Data Data Data
Operating System
Detect: Tamper-proof monitoring/introspection
15
Operating System
Hardware and Firmware
Normal mode
Monitor
Secure mode
Detect: Primitives to enable detection outside The Machine
16
HPE DNS Malware Analytics
Where to collect data from? – problems placing probes
Primitives/APIs for event collection
Recover: Recovery from malicious actions
17
Recovery at the
firmware layer
OS, application
and data recovery
Systematic recovery at scale with
minimal human intervention
Example: Recover from kernel level malware attack
• Out-of-band integrity measures trigger an alarm
• Migrate workload to a new core
• Perform secure reboot to restore trusted state
• Freeze machine core and send for forensic analysis
• Turn on advanced monitoring
Security for The Machine
18
Efficient Resilient Scalable Manageable
• An opportunity to design and implement security from the ground up
• Security is not an afterthought, but a conscious design decision
Thank you
james.salter@hpe.com
19

More Related Content

PPTX
Big data ... for security
PPTX
Blackhat USA 2016 - What's the DFIRence for ICS?
PPT
DHS ICS Security Presentation
PPTX
ICS Security 101 by Sandeep Singh
PPSX
Motion based security alarm
PDF
Intelligent Wireless Sensor Network based Monitoring for Process Automation
PPTX
The Future of ICS Security Products
PDF
Software Defined Substation Intelligence, Automation and Control
Big data ... for security
Blackhat USA 2016 - What's the DFIRence for ICS?
DHS ICS Security Presentation
ICS Security 101 by Sandeep Singh
Motion based security alarm
Intelligent Wireless Sensor Network based Monitoring for Process Automation
The Future of ICS Security Products
Software Defined Substation Intelligence, Automation and Control

What's hot (20)

PPTX
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
PDF
Chapter 1 pdf
PDF
October 2014 Webinar: Cybersecurity Threat Detection
PPTX
BSidesAugusta ICS SCADA Defense
PDF
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
PDF
Cybersecurity in Industrial Control Systems (ICS)
PDF
DEF CON 23 - NSM 101 for ICS
PDF
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
PPTX
Master Serial Killer - DEF CON 22 - ICS Village
PPTX
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
PPTX
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
PDF
Meeting 3 network administrator tools
PPTX
Internet of things v1.2
PPTX
Lessons Learned for a Behavior-Based IDS in the Energy Sector
PDF
The journey to ICS - Extended
PDF
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
PPTX
Big Data Shouldn't Be Big
PPTX
Protecting Your DNP3 Networks
PPTX
Hacker Halted 2016 - How to get into ICS security
PPTX
Final presentation
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
Chapter 1 pdf
October 2014 Webinar: Cybersecurity Threat Detection
BSidesAugusta ICS SCADA Defense
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Cybersecurity in Industrial Control Systems (ICS)
DEF CON 23 - NSM 101 for ICS
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Master Serial Killer - DEF CON 22 - ICS Village
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
Meeting 3 network administrator tools
Internet of things v1.2
Lessons Learned for a Behavior-Based IDS in the Energy Sector
The journey to ICS - Extended
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Big Data Shouldn't Be Big
Protecting Your DNP3 Networks
Hacker Halted 2016 - How to get into ICS security
Final presentation
Ad

Similar to Security for The Machine: By Design (20)

PDF
Nt1330 Unit 1 Problem Analysis Paper
PDF
Apache Spark for Cyber Security in an Enterprise Company
PDF
PPTX
Cat info mgt
PPTX
Innovation with ai at scale on the edge vt sept 2019 v0
PPTX
The Next AMPLab: Real-Time, Intelligent, and Secure Computing
PPT
Lec no. 4 hardware and software basic
PDF
Spark Summit EU 2016: The Next AMPLab: Real-time Intelligent Secure Execution
PDF
Persistent Memory Programming: The Current State of the Ecosystem
PDF
Understanding and Improving Device Access Complexity
PPT
Hardware and Software Basics With Dr. Poirot
PPT
Hardware
PPT
PDF
Ceph on Intel: Intel Storage Components, Benchmarks, and Contributions
PDF
Ceph on Intel: Intel Storage Components, Benchmarks, and Contributions
PDF
Spectrum Scale final
PDF
How to not fail at security data analytics (by CxOSidekick)
PPTX
Zero footprint guest memory introspection from xen
PDF
Introduction to Programming Fundamentals
Nt1330 Unit 1 Problem Analysis Paper
Apache Spark for Cyber Security in an Enterprise Company
Cat info mgt
Innovation with ai at scale on the edge vt sept 2019 v0
The Next AMPLab: Real-Time, Intelligent, and Secure Computing
Lec no. 4 hardware and software basic
Spark Summit EU 2016: The Next AMPLab: Real-time Intelligent Secure Execution
Persistent Memory Programming: The Current State of the Ecosystem
Understanding and Improving Device Access Complexity
Hardware and Software Basics With Dr. Poirot
Hardware
Ceph on Intel: Intel Storage Components, Benchmarks, and Contributions
Ceph on Intel: Intel Storage Components, Benchmarks, and Contributions
Spectrum Scale final
How to not fail at security data analytics (by CxOSidekick)
Zero footprint guest memory introspection from xen
Introduction to Programming Fundamentals
Ad

More from James Salter (10)

PPTX
The Machine - a vision for the future of computing
PPTX
Accumulo: A Quick Introduction
PPTX
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
PPTX
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
PPT
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PPTX
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
PPT
Agents and P2P Networks
PPT
Lecture - Network Technologies: Peer-to-Peer Networks
PPT
Lecture: Software Agents and P2P
PPTX
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
The Machine - a vision for the future of computing
Accumulo: A Quick Introduction
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
Agents and P2P Networks
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture: Software Agents and P2P
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
Teaching material agriculture food technology
PDF
Getting Started with Data Integration: FME Form 101
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25-Week II
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Teaching material agriculture food technology
Getting Started with Data Integration: FME Form 101
MIND Revenue Release Quarter 2 2025 Press Release
Group 1 Presentation -Planning and Decision Making .pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
SOPHOS-XG Firewall Administrator PPT.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Security for The Machine: By Design

  • 1. Security for The Machine: By Design James Salter, Research Manager Security and Manageability Lab
  • 2. 2014 DNS Logging Trafodion Location Aware 1967 Cesium-beam atomic clock 1966 Light-Emitting Diode (LED) 1972 Pocket Scientific Calculator 1975 Standard for Interface Bus 1980 Office Laser Printer 1984 Inkjet Printer 1986 3D graphics workstations 1980 64-channel Ultrasound 1989 Digital Data Storage Drive 1994 64-bit architecture 1999 Molecular Logic Gate 2001 Utility Data Center 2002 Rewritable DVD for standard players 2003 Smart Cooling 2005 Virus Throttle 2010 ePrint 2011 MagCloud 2011 3D Photon Engine 2011 StoreOnce 2012 StoreAll 2013 Threat Central 2013 SureStart 2014 3D Printing Technology Innovation is our legacy and our future 1966 1968 Programmable Desktop Calculator 1986 Commercialized RISC chips 2008 Memristor discovered 2012 OpenFlow switches 2013 HP Moonshot 2015 Distributed R HP Labs
  • 3. Innovation is our legacy and our future
  • 4. The Past 60 Years 4 1950s 1960s 1970s 1980s 1990s 2000s Today
  • 9. 9
  • 11. Security challenges 11 Scale New architecture Which control points? Performance bottleneck Resource constraints
  • 12. Principles Security by design, not as an afterthought A secure foundation for applications 12
  • 13. The Machine security framework 13 The first computer with security built-in from the ground up Data always protected: in use, in flight and at rest Secure boot and firmware Run time monitoring Access control Low energy encryption Protect Giving The Machine the ability to protect itself, even against completely unknown threats Compromised components Firmware and kernel tampering Runtime malware monitoring Monitoring for data leakage Detect Always safe, always recoverable, without sacrificing performance Recovery at the firmware layer OS, application, and data recovery Systematic recovery at scale with minimal human intervention Recover
  • 14. Protect: Access control at different layers 14 Hardware Application Thread Data Data Data Application Thread Data Data Data Operating System
  • 15. Detect: Tamper-proof monitoring/introspection 15 Operating System Hardware and Firmware Normal mode Monitor Secure mode
  • 16. Detect: Primitives to enable detection outside The Machine 16 HPE DNS Malware Analytics Where to collect data from? – problems placing probes Primitives/APIs for event collection
  • 17. Recover: Recovery from malicious actions 17 Recovery at the firmware layer OS, application and data recovery Systematic recovery at scale with minimal human intervention Example: Recover from kernel level malware attack • Out-of-band integrity measures trigger an alarm • Migrate workload to a new core • Perform secure reboot to restore trusted state • Freeze machine core and send for forensic analysis • Turn on advanced monitoring
  • 18. Security for The Machine 18 Efficient Resilient Scalable Manageable • An opportunity to design and implement security from the ground up • Security is not an afterthought, but a conscious design decision