Seeds of SEED: Building and Verifying Foundationally Isolated Hardware Architectures

被引:0
作者
Oberg, Jason [1 ]
机构
[1] Tortuga Log Inc, San Jose, CA 95113 USA
来源
2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021) | 2021年
关键词
hardware security; information flow tracking; hardware root of trust; security verification;
D O I
10.1109/SEED51797.2021.00032
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increased sharing of hardware resources to meet the system performance of the semiconductor industry's next generation applications is continuing to drive significant growth in new weaknesses and vulnerabilities. This paper reinforces the need for building foundationally isolated hardware that can be verified based on information flow guarantees. It gives a unique perspective on the problem, describes some important initiatives, and provides some guidance on what processes can be implemented to help combat it.
引用
收藏
页码:210 / 214
页数:5
相关论文
共 21 条
[1]  
cwe.mitre, COMMON WEAKNESS ENUM
[2]  
Hu W., 2011, PROC INT WORKSHOP LO
[3]   Detecting Hardware Trojans with Gate-Level Information-Flow Tracking [J].
Hu, Wei ;
Mao, Baolei ;
Oberg, Jason ;
Kastner, Ryan .
COMPUTER, 2016, 49 (08) :44-52
[4]   Gate-Level Information Flow Tracking for Security Lattices [J].
Hu, Wei ;
Mu, Dejun ;
Oberg, Jason ;
Mao, Baolei ;
Tiwari, Mohit ;
Sherwood, Timothy ;
Kastner, Ryan .
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2014, 20 (01) :1-25
[5]   Expanding Gate Level Information Flow Tracking for Multilevel Security [J].
Hu, Wei ;
Oberg, Jason ;
Barrientos, Janet ;
Mu, Dejun ;
Kastner, Ryan .
IEEE EMBEDDED SYSTEMS LETTERS, 2013, 5 (02) :25-28
[6]  
Hu W, 2012, ICCAD-IEEE ACM INT, P585
[7]   On the Complexity of Generating Gate Level Information Flow Tracking Logic [J].
Hu, Wei ;
Oberg, Jason ;
Irturk, Ali ;
Tiwari, Mohit ;
Sherwood, Timothy ;
Mu, Dejun ;
Kastner, Ryan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :1067-1080
[8]   Theoretical Fundamentals of Gate Level Information Flow Tracking [J].
Hu, Wei ;
Oberg, Jason ;
Irturk, Ali ;
Tiwari, Mohit ;
Sherwood, Timothy ;
Mu, Dejun ;
Kastner, Ryan .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2011, 30 (08) :1128-1140
[9]  
Kastner R., 2011, INT C ENG RECONFIGUR, P1
[10]   Spectre Attacks: Exploiting Speculative Execution [J].
Kocher, Paul ;
Horn, Jann ;
Fogh, Anders ;
Genkin, Daniel ;
Gruss, Daniel ;
Haas, Werner ;
Hamburg, Mike ;
Lipp, Moritz ;
Mangard, Stefan ;
Prescher, Thomas ;
Schwarz, Michael ;
Yarom, Yuval .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1-19