首页> 外文会议>Annual IEEE/ACM International Symposium on Microarchitecture >Execution Leases: A Hardware-Supported Mechanism for Enforcing Strong Non-Interference
【24h】

Execution Leases: A Hardware-Supported Mechanism for Enforcing Strong Non-Interference

机译:执行租赁:用于执行强大的非干扰的硬件支持机制

获取原文

摘要

High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the control of media for entertainment, or supporting a remote monitoring interface) while others are absolutely critical (such as the control of safety mechanisms, or maintaining the secrecy of a root key). While special purpose languages, careful code reviews, and automated theorem proving can be used to help mitigate the risk of combining these operations onto a single machine, it is difficult to say if any of these techniques are truly complete because they all assume a simplified model of computation far different from an actual processor implementation both in functionality and timing. In this paper we propose a new method for creating architectures that both a) makes the complete information-flow properties of the machine fully explicit and available to the programmer and b) allows those properties to be verified all the way down to the gate-level implementation the design. The core of our contribution is a new call-and-return mechanism, Execution Leases, that allows regions of execution to be tightly quarantined and their side effects to be tightly bounded. Because information can flow through un-trusted program counters, stack pointer or other global processor state, these and other states are leased to untrusted environments with an architectural bound on both the time and memory that will be accessible to the untrusted code. We demonstrate through a set of novel micro-architectural modifications that these leases can be enforced precisely enough to form the basis for information-flow bounded function calls, table lookups, and mixed-trust execution. Our novel architecture is a significant improvement in both flexibility and performance over the initial Gate-Level Information Flow Tracking architectures, and we demonstrate the effectiveness of the resulting design through the development of a new language, compiler, ISA, and synthesizable prototype.
机译:诸如飞机控制中发现的高的保证系统和金融业通常需要处理一些任务的组合,其中有些是杰出的(例如娱乐的媒体控制,或支持远程监控界面),而其他则是绝对关键的(如控制安全机制,或保持根键的保密)。虽然专门的语言,仔细的代码评论和自动定理证明可以用来帮助减轻将这些操作结合到单个机器上的风险,但很难说如果这些技术中的任何一个都是真正的完整,因为它们都承担了简化的模型从功能和时序中的实际处理器实现的计算远远不同。在本文中,我们提出了一种创建架构的新方法,即A)使机器的完整信息流特性完全显式和可用于程序员和B)允许将这些属性一直验证到门级实施设计。我们的贡献的核心是一个新的呼叫和返回机制,执行租赁,允许执行区域紧密隔离,并且它们的副作用是紧密的。因为信息可以通过不可信任的程序计数器流,堆栈指针或其他全局处理器状态,这些和其他状态租用到不受信任的环境,其时间和内存都可以访问不可信代码。我们通过一组新颖的微型架构修改来证明这些租赁可以精确地强制执行,以形成信息流界函数调用,表查找和混合信任执行的基础。我们的新颖架构是初始门级信息流跟踪架构的灵活性和性能的显着改进,我们通过开发新的语言,编译器,ISA和合成的原型来展示所产生的设计的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号