Sapper: A Language for Hardware-Level Security Policy Enforcement

被引:0
|
作者
Li, Xun [1 ]
Kashyap, Vineeth [2 ]
Oberg, Jason K. [3 ]
Tiwari, Mohit [4 ]
Rajarathinam, Vasanth Ram [5 ]
Kastner, Ryan [3 ]
Sherwood, Timothy [2 ]
Hardekopf, Ben [2 ]
Chong, Frederic T. [2 ]
机构
[1] Facebook, Menlo Pk, CA 94025 USA
[2] Univ Calif Santa Barbara, Santa Barbara, CA 93106 USA
[3] Univ Calif San Diego, San Diego, CA 92103 USA
[4] Univ Texas, Austin, TX USA
[5] AMD, Sunnyvale, CA USA
关键词
Hardware Description Language; Non-interference; ARCHITECTURE; PERFORMANCE;
D O I
10.1145/2541940.2541947
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Privacy and integrity are important security concerns. These concerns are addressed by controlling information flow, i.e., restricting how information can flow through a system. Most proposed systems that restrict information flow make the implicit assumption that the hardware used by the system is fully "correct" and that the hardware's instruction set accurately describes its behavior in all circumstances. The truth is more complicated: modern hardware designs defy complete verification; many aspects of the timing and ordering of events are left totally unspecified; and implementation bugs present themselves with surprising frequency. In this work we describe Sapper, a novel hardware description language for designing security-critical hardware components. Sapper seeks to address these problems by using static analysis at compile-time to automatically insert dynamic checks in the resulting hardware that provably enforce a given information flow policy at execution time. We present Sapper's design and formal semantics along with a proof sketch of its security. In addition, we have implemented a compiler for Sapper and used it to create a non-trivial secure embedded processor with many modern microarchitectural features. We empirically evaluate the resulting hardware's area and energy overhead and compare them with alternative designs.
引用
收藏
页码:97 / 111
页数:15
相关论文
共 50 条
  • [1] Hardware-Level Secure Coding
    Lopresti, Raul Eduardo
    Moreira, Jorge Castineira
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (01) : 41 - 44
  • [2] Spiking Neuron Hardware-Level Fault Modeling
    El-Sayed, Sarah A.
    Spyrou, Theofilos
    Pavlidis, Antonios
    Afacan, Engin
    Camunas-Mesa, Luis A.
    Linares-Barranco, Bernabe
    Stratigopoulos, Haralampos-G
    [J]. 2020 26TH IEEE INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2020), 2020,
  • [3] Language Based Information Routing Security: Policy Enforcement
    Oreku, George
    Li, Jianzhong
    Mtenzi, Fredrick
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2009, 6 (01) : 91 - 98
  • [4] COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity
    Basu, Kanad
    Hussain, Suha Sabi
    Gupta, Ujjwal
    Karri, Ramesh
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 3213 - 3226
  • [5] A hardware-level trust measurement approach without operating system
    Zhang, Fan
    Zhang, Cong
    Chen, Wei
    Xu, Mingdi
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2014, 42 (11): : 6 - 10
  • [6] An overview of hardware-level statistical power analysis attack countermeasures
    Mayhew M.
    Muresan R.
    [J]. Journal of Cryptographic Engineering, 2017, 7 (3) : 213 - 244
  • [7] Recent advances and new avenues in hardware-level reliability support
    Iyer, RK
    Nakka, NM
    Kalbarczyk, ZT
    Mitra, S
    [J]. IEEE MICRO, 2005, 25 (06) : 18 - 29
  • [8] A HARDWARE-LEVEL METHOD TO IMPROVE THE RANGE AND ACCURACY OF AN ULTRASONIC RANGING SYSTEM
    FIGUEROA, JF
    DOUSSIS, E
    [J]. ACUSTICA, 1993, 78 (04): : 226 - 232
  • [9] Akoman: Hardware-Level Malware Detection Using Discrete Wavelet Transform
    Alizadeh, Niloofar S.
    Abadi, Mahdi
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2018), 2018, : 476 - 481
  • [10] Security policy refinement and enforcement for the design of multi-level secure systems
    Zhou, Jie
    Alves-Foss, Jim
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (02) : 107 - 131