首页> 外文期刊>Embedded Systems Letters, IEEE >GANDALF: A Fine-Grained Hardware–Software Co-Design for Preventing Memory Attacks
【24h】

GANDALF: A Fine-Grained Hardware–Software Co-Design for Preventing Memory Attacks

机译:GANDALF:防止内存攻击的细粒度软硬件协同设计

获取原文
获取原文并翻译 | 示例
           

摘要

Illegal memory accesses are a serious security vulnerability that have been exploited on numerous occasions. In this letter, we present Gandalf, a compiler assisted hardware extension for the OpenRISC processor that thwarts all forms of memory-based attacks. We associate lightweight capabilities to all program variables, which are checked at run time by the hardware. Gandalf is transparent to the user and does not require significant OS modifications. Moreover, it achieves locality and incurs minimal overheads in the hardware. We demonstrate these features with a customized Linux kernel executing SPEC2006 benchmarks. To the best of our knowledge, this is the first work to demonstrate a complete solution for hardware-based memory protection schemes for embedded platforms.
机译:非法的内存访问是一个严重的安全漏洞,已经被无数次利用。在这封信中,我们介绍了Gandalf,这是OpenRISC处理器的编译器辅助硬件扩展,可以阻止所有形式的基于内存的攻击。我们将轻量级功能与所有程序变量关联,这些变量在运行时由硬件检查。 Gandalf对用户是透明的,不需要大量的OS修改。此外,它可以实现局部性并在硬件上产生最小的开销。我们通过执行SPEC2006基准测试的定制Linux内核来演示这些功能。据我们所知,这是展示用于嵌入式平台的基于硬件的内存保护方案的完整解决方案的第一项工作。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号