首页> 外文会议>Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture >Execution leases: A hardware-supported mechanism for enforcing strong non-interference
【24h】

Execution leases: A hardware-supported mechanism for enforcing strong non-interference

机译:执行租约:一种硬件支持的机制,用于强力实现非干扰

获取原文

摘要

High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the control of media for entertainment, or supporting a remote monitoring interface) while others are absolutely critical (such as the control of safety mechanisms, or maintaining the secrecy of a root key). While special purpose languages, careful code reviews, and automated theorem proving can be used to help mitigate the risk of combining these operations onto a single machine, it is difficult to say if any of these techniques are truly complete because they all assume a simplified model of computation far different from an actual processor implementation both in functionality and timing. In this paper we propose a new method for creating architectures that both a) makes the complete information-flow properties of the machine fully explicit and available to the programmer and b) allows those properties to be verified all the way down to the gate-level implementation the design. The core of our contribution is a new call-and-return mechanism, Execution Leases, that allows regions of execution to be tightly quarantined and their side effects to be tightly bounded. Because information can flow through untrusted program counters, stack pointer or other global processor state, these and other states are leased to untrusted environments with an architectural bound on both the time and memory that will be accessible to the untrusted code. We demonstrate through a set of novel micro-architectural modifications that these leases can be enforced precisely enough to form the basis for information-flow bounded function calls, table lookups, and mixed-trust execution. Our novel architecture is a significant improvement in both flexibility and performance over the initial Gate-Level Information Flow Tracking architectures, and we demonstrate the effectiveness of the resulting design through the development of a -new language, compiler, ISA, and synthesizable prototype.
机译:诸如飞机控制系统和金融行业中发现的那些高安全性系统通常需要处理好一些精美的任务(例如娱乐媒体的控制或支持远程监视界面)的混合任务,而其他一些绝对关键的任务(例如控制安全机制,或维护根密钥的保密性)。虽然可以使用专用语言,仔细的代码审查和自动定理证明来帮助减少将这些操作组合到一台机器上的风险,但很难说这些技术中的任何一项是否真正完整,因为它们都假定为简化模型。在功能和时序上与实际处理器实现有很大不同的计算量。在本文中,我们提出了一种用于创建体系结构的新方法:a)使机器的完整信息流属性完全明确并可供程序员使用; b)允许这些属性一直进行到门级的验证。实施设计。我们的贡献的核心是新的调用返回机制Execution Leases,该机制可以严格隔离执行区域,并严格限制其副作用。由于信息可以流经不受信任的程序计数器,堆栈指针或其他全局处理器状态,因此这些状态和其他状态被租借到不受信任的环境,其架构在时间和内存上都受到不受信任的代码可访问的限制。通过一组新颖的微体系结构修改,我们证明了这些租约可以足够精确地执行,从而构成信息流有界函数调用,表查找和混合信任执行的基础。与最初的门级信息流跟踪体系结构相比,我们的新颖体系结构在灵活性和性能上都有了显着提高,并且通过开发以下产品,我们证明了最终设计的有效性: 新语言,编译器,ISA和可综合的原型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号