Memory-centric security architecture

被引:0
作者
Shi, Weidong [1 ]
Lu, Chenghuai [1 ]
Lee, Hsien-Hsin S. [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
来源
TRANSACTIONS ON HIGH-PERFORMANCE EMBEDDED ARCHITECTURES AND COMPILERS I | 2007年 / 4050卷
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a new security model called MESA for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for the same purpose, MESA ties cryptographic properties and security attributes to memory instead of each individual user process. The advantages of such a memory-centric design over the process-centric designs are many folds. First, it allows better access control on software privacy, which supports both selective and mixed tamper resistant protection on software components coming from heterogenous sources. Second, the new model supports and facilities tamper resistant secure information sharing in an open software system where both data and code components could be shared by different user processes. Third, the proposed security model and secure processor design allow software components protected with different security policies to inter-operate within the same memory space efficiently. The architectural support for MESA requires small silicon resources and its performance impact is minimal based on our experimental results using commercial MS Windows workloads and cycle based out-of-order processor simulator.
引用
收藏
页码:95 / +
页数:3
相关论文
共 15 条
[1]  
ARBAUGH WA, 1997, P S SEC PRIV
[2]  
COHEN E, 1975, P 5 ACM S OP SYST PR
[3]  
GASSEND B., 2003, P 9 INT S HIGH PERF
[4]  
LIE D, 2003, P S OP SYST PRINC
[5]  
LIE D, 2000, P 9 S ARCH SUPP PROG
[6]  
*NAT I STAND TECHN, 2001, DEF INF PROC STAND D
[7]  
NEEDHAM RM, 1977, P S OP SYST PRINC
[8]  
SHI W, 2005, P 32 INT S COMP ARCH
[9]  
SUH EG, 2003, P INT C SUP
[10]  
SUH EG, 2003, P 36 ANN INT S MICR