Skip to main content

2010 | OriginalPaper | Buchkapitel

5. Memory Protection on FPGAs

verfasst von : Dr. Ted Huffmire, Dr. Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Dr. Ryan Kastner, Dr. Timothy Sherwood

Erschienen in: Handbook of FPGA Design Security

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter describes a memory access policy language (Huffmire et al., Proceedings of the European Symposium on Research in Computer Security (ESORICS), Hamburg, Germany, September 2006), based on formal regular languages, and demonstrates how this language can express classical security policies, including isolation, controlled sharing, and Chinese wall. This chapter also describes a policy compiler (Huffmire et al., Proceedings of the European Symposium on Research in Computer Security (ESORICS), Hamburg, Germany, September 2006) that translates an access policy expressed in this language into a synthesizeable hardware module.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A. Aho, R. Sethi, J. Ullman, Compilers: Principles, Techniques, and Tools (Addison Wesley, Reading, 1988) A. Aho, R. Sethi, J. Ullman, Compilers: Principles, Techniques, and Tools (Addison Wesley, Reading, 1988)
2.
3.
Zurück zum Zitat J.P. Anderson, Computer security technology planning study. Technical Report ESD-TR-73-51, ESD/AFSC, Hanscorn AFB, Bedford, MA, 1972 J.P. Anderson, Computer security technology planning study. Technical Report ESD-TR-73-51, ESD/AFSC, Hanscorn AFB, Bedford, MA, 1972
4.
Zurück zum Zitat D.E. Bell, L.J. LaPadula, Secure computer systems: mathematical foundations and model. The MITRE Corporation, Bedford, MA, USA, May 1973 D.E. Bell, L.J. LaPadula, Secure computer systems: mathematical foundations and model. The MITRE Corporation, Bedford, MA, USA, May 1973
5.
Zurück zum Zitat K.J. Biba, Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, 1977 K.J. Biba, Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, 1977
6.
Zurück zum Zitat D.F.C. Brewer, M.J. Nash, The Chinese wall security policy, in Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989 D.F.C. Brewer, M.J. Nash, The Chinese wall security policy, in Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
9.
Zurück zum Zitat T. Huffmire, S. Prasad, T. Sherwood, R. Kastner, Policy-driven memory protection for reconfigurable hardware, in Proceedings of the European Symposium on Research in Computer Security (ESORICS), Hamburg, Germany, September 2006 T. Huffmire, S. Prasad, T. Sherwood, R. Kastner, Policy-driven memory protection for reconfigurable hardware, in Proceedings of the European Symposium on Research in Computer Security (ESORICS), Hamburg, Germany, September 2006
10.
Zurück zum Zitat T. Huffmire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner, Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems, in Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2007 T. Huffmire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner, Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems, in Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2007
11.
Zurück zum Zitat T. Huffmire, T. Sherwood, R. Kastner, T. Levin, Enforcing memory policy specifications in reconfigurable hardware. Comput. Secur. 27(5–6), 197–215 (2008) CrossRef T. Huffmire, T. Sherwood, R. Kastner, T. Levin, Enforcing memory policy specifications in reconfigurable hardware. Comput. Secur. 27(5–6), 197–215 (2008) CrossRef
12.
Zurück zum Zitat S. Johnson, Yacc: yet another compiler-compiler. Technical Report CSTR-32, Bell Laboratories, Murray Hill, NJ, 1975 S. Johnson, Yacc: yet another compiler-compiler. Technical Report CSTR-32, Bell Laboratories, Murray Hill, NJ, 1975
13.
Zurück zum Zitat M. Lesk, E. Schmidt, Lex: a lexical analyzer generator. Technical Report 39, Bell Laboratories, Murray Hill, NJ, October 1975 M. Lesk, E. Schmidt, Lex: a lexical analyzer generator. Technical Report 39, Bell Laboratories, Murray Hill, NJ, October 1975
14.
Zurück zum Zitat P. Linz, An Introduction to Formal Languages and Automata (Jones and Bartlett, Sudbury, 2001) P. Linz, An Introduction to Formal Languages and Automata (Jones and Bartlett, Sudbury, 2001)
15.
Zurück zum Zitat J. Navarro, S. Iyer, P. Druschel, A. Cox, Practical, transparent operating system support for Superpages, in Fifth Symposium on Operating Systems Design and Implementation (OSDI’02), Boston, MA, December 2002 J. Navarro, S. Iyer, P. Druschel, A. Cox, Practical, transparent operating system support for Superpages, in Fifth Symposium on Operating Systems Design and Implementation (OSDI’02), Boston, MA, December 2002
16.
Zurück zum Zitat D. Raymond, D. Wood, Grail: A C++ library for automata and expressions. J. Symb. Comput. 11, 341–350 (1995) D. Raymond, D. Wood, Grail: A C++ library for automata and expressions. J. Symb. Comput. 11, 341–350 (1995)
17.
Zurück zum Zitat J. Rushby, A trusted computing base for embedded systems, in Proceedings 7th DoD/NBS Computer Security Conference, September 1984, pp. 294–311 J. Rushby, A trusted computing base for embedded systems, in Proceedings 7th DoD/NBS Computer Security Conference, September 1984, pp. 294–311
18.
Zurück zum Zitat J. Saltzer, Protection and the control of information sharing in Multics. Commun. ACM 17(7), 388–402 (1974) CrossRef J. Saltzer, Protection and the control of information sharing in Multics. Commun. ACM 17(7), 388–402 (1974) CrossRef
19.
Zurück zum Zitat F.B. Schneider, Enforceable security policies. ACM Trans. Inform. Syst. Secur. 3(1), 30–50 (2000) CrossRef F.B. Schneider, Enforceable security policies. ACM Trans. Inform. Syst. Secur. 3(1), 30–50 (2000) CrossRef
20.
Zurück zum Zitat G.W. Smith, R.B. Newton, A taxonomy of organisational security policies, in Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD, USA, October 2000 G.W. Smith, R.B. Newton, A taxonomy of organisational security policies, in Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD, USA, October 2000
21.
Zurück zum Zitat D.F. Sterne, On the buzzword “security policy”, in Proceedings of the 1991 IEEE Symposium on Security and Privacy, Oakland, CA, 1991, pp. 219–230 D.F. Sterne, On the buzzword “security policy”, in Proceedings of the 1991 IEEE Symposium on Security and Privacy, Oakland, CA, 1991, pp. 219–230
22.
Zurück zum Zitat E. Witchel, J. Cates, K. Asanovic, Mondrian memory protection, in Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, CA, October 2002 E. Witchel, J. Cates, K. Asanovic, Mondrian memory protection, in Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, CA, October 2002
23.
Zurück zum Zitat M.E. Zurko, R.T. Simon, User-centered security, in Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, September 1996 M.E. Zurko, R.T. Simon, User-centered security, in Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, September 1996
Metadaten
Titel
Memory Protection on FPGAs
verfasst von
Dr. Ted Huffmire
Dr. Cynthia Irvine
Thuy D. Nguyen
Timothy Levin
Dr. Ryan Kastner
Dr. Timothy Sherwood
Copyright-Jahr
2010
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-90-481-9157-4_5