Extended Abstract: Trustworthy System Security through 3-D Integrated Hardware
Loading...
Authors
Huffmire, Ted
Valamehr, Jonathan
Sherwood, Timothy
Kastner, Ryan
Levin, Timothy
Nguyen, Thuy D.
Irvine, Cynthia E.
Subjects
Advisors
Date of Issue
2008-06-01
Date
Publisher
IEEE
Language
Abstract
While hardware resources in the form of both transistors and full microprocessor cores are now abundant, economic factors prevent specialized hardware mechanisms required for secure processing from being integrated into commodity parts. We are exploring a novel way in which commodity hardware can be augmented after fabrication to enhance secure operation for only those systems that require it. Our methods will be applicable to a wide range of security problems, including the detection and isolation of hardware subversion and Trojan horses, cache-based side channels in chip multi-processors (CMPs), embedded systems security, and hardware intrusion detection and prevention. Utilizing off-the-shelf components to build trustworthy systems results in a constant battle with the underlying machine to provide separation, isolation, and protection. This problem is exacerbated by the movement to multi-core processors since security functionality (e.g., strong security primitives) is rarely considered a priority at the platform ISA or micro-architecture levels and since features exploitable by adversaries (e.g., resource sharing) are included for performance at the expense of security. Without a significant shift in the way computing systems are constructed (from the software down to the circuits), unacceptable amounts of time and resources will be spent attempting to contain the vulnerabilities introduced by each new processor performance feature. To address these problems, we are pursuing a radical transformation in the way trustworthy systems are developed and deployed, one that allows direct hardware support for fine grain control of the underlying hardware system, yet that can still leverage the performance and cost benefits provided by the latest commodity parts through the augmentation of those parts with a 3-D Integration approach.
Type
Article
Description
Series/Report No
Department
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST-2008), Anaheim, CA, June 2008
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
