首页> 外文期刊>Computer architecture news >SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs
【24h】

SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs

机译:SPECS:一种轻量级运行时机制,用于保护软件免受安全关键处理器错误的侵害

获取原文
获取原文并翻译 | 示例

摘要

Processor implementation errata remain a problem, and worse, a subset of these bugs are security-critical. We classified 7 years of errata from recent commercial processors to understand the magnitude and severity of this problem, and found that of 301 errata analyzed, 28 are security-critical. We propose the Security-critical Processor Errata Catching System (SPECS) as a low-overhead solution to this problem. SPECS employs a dynamic verification strategy that is made lightweight by limiting protection to only security-critical processor state. As a proof-of-concept, we implement a hardware prototype of SPECS in an open source processor. Using this prototype, we evaluate SPECS against a set of 14 bugs inspired by the types of security-critical errata we discovered in the classification phase. The evaluation shows that SPECS is 86% effective as a defense when deployed using only ISA-level state; incurs less than 5% area and power overhead; and has no software run-time overhead.
机译:处理器实现勘误仍然是一个问题,更糟糕的是,这些错误的一部分对安全至关重要。我们对最近商用处理器的7年勘误表进行了分类,以了解此问题的严重性和严重性,并发现在分析的301勘误表中,有28个对安全性至关重要。我们建议将安全关键型处理器勘误捕获系统(SPECS)作为对此问题的低开销解决方案。 SPECS采用了动态验证策略,该策略通过将保护仅限于对安全性至关重要的处理器状态而变得轻巧。作为概念验证,我们在开源处理器中实现SPECS的硬件原型。使用该原型,我们根据在分类阶段发现的对安全至关重要的勘误类型的启发,针对一组14个错误评估了SPECS。评估显示,仅使用ISA级别的状态进行部署时,SPECS作为防御的有效率为86%。所占面积和电力开销少于5%;并且没有软件运行时的开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号