Enforcing Memory Policy Specifications in Reconfigurable Hardware
dc.contributor.author | Huffmire, Ted | |
dc.contributor.author | Sherwood, Timothy | |
dc.contributor.author | Kastner, Ryan | |
dc.contributor.author | Levin, Timothy | |
dc.date.accessioned | 2012-07-11T15:49:36Z | |
dc.date.available | 2012-07-11T15:49:36Z | |
dc.date.issued | 2008-10-01 | |
dc.identifier.citation | Computers and Security, vol. 27, pp. 197-215, October 2008. | |
dc.identifier.uri | http://hdl.handle.net/10945/7156 | |
dc.description.abstract | While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection. Several reconfigurable cores are often integrated onto a single chip where they share external resources such as memory. While this enables small form factor and low cost designs, it opens up the opportunity for modules to intercept or even interfere with the operation of one another. We investigate the design and synthesis of a FPGA memory protection mechanism capable of enforcing access control policies and a methodology for translating formal policy descriptions into FPGA enforcement mechanisms. The efficiency of our access language design flow is evaluated in terms of area and cycle time across a variety of security scenarios. We also describe a technique for ensuring that the internal state of the reference monitor cannot be used as a covert storage channel. | en_US |
dc.publisher | Computers and Security | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | Enforcing Memory Policy Specifications in Reconfigurable Hardware | en_US |
dc.type | Article | en_US |
dc.contributor.department | Computer Science (CS) | |
dc.subject.author | Reconfigurable hardware | en_US |
dc.subject.author | Protection mechanisms | en_US |
dc.subject.author | Security and Privacy Protection | en_US |
dc.subject.author | Access controls | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |