Filters








6,213 Hits in 5.6 sec

Enforcing memory policy specifications in reconfigurable hardware

Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timothy Levin
2008 Computers & security  
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically  ...  We investigate the design and synthesis of a FPGA memory protection mechanism capable of enforcing access control policies and a methodology for translating formal policy descriptions into FPGA enforcement  ...  In this section we explain both the high level policy description and the automated sequence of steps, or design flow, for converting a memory access policy into a hardware enforcement module.  ... 
doi:10.1016/j.cose.2008.05.002 fatcat:krgulshf7fdhrmvfls4y3566yq

Policy-Driven Memory Protection for Reconfigurable Hardware [chapter]

Ted Huffmire, Shreyas Prasad, Tim Sherwood, Ryan Kastner
2006 Lecture Notes in Computer Science  
While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection  ...  We investigate the design and synthesis of a memory protection mechanism capable of enforcing policies expressed as a formal language.  ...  This circuit, represented as a bit-stream, can then be loaded into a reconfigurable hardware module and used as an execution monitor to analyze memory accesses and enforce the policy.  ... 
doi:10.1007/11863908_28 fatcat:4ruhyhl25bb5rddk5c3fap6zai

Blueswitch: enabling provably consistent configuration of network switches

Jong Hun Han, Prashanth Mundkur, Charalampos Rotsos, Gianni Antichi, Nirav Dave, Andrew W. Moore, Peter G. Neumann
2015 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)  
We demonstrate that consistent configuration updates require guarantees of strong switch-level atomicity from both hardware and software layers of switches -even in a single switch.  ...  In this paper, we focus on the behavior of individual switches, and demonstrate that even simple rule updates result in inconsistent packet switching in multi-table datapaths.  ...  The views, opinions, and/or findings contained in this article/presentation are those of the author/ presenter and should not be interpreted as representing the official views or policies, either expressed  ... 
doi:10.1109/ancs.2015.7110117 dblp:conf/ancs/HanMRADMN15 fatcat:tuehem3nbrdp3epkcuwpgukfje

A Study of Security Isolation Techniques

Rui Shu, Peipei Wang, Sigmund A Gorski III, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, Xiaohui Gu
2016 ACM Computing Surveys  
We break the mechanism into two dimensions: enforcement location and isolation granularity, and break the policy aspect down into three dimensions: policy generation, policy configurability, and policy  ...  At the top level, we consider two principal aspects: mechanism and policy. Each aspect is broken down into salient dimensions that describe key properties.  ...  Any opinions, conclusions or recommendations expressed in this article are those of the authors and do not necessarily reflect the views of the funding agencies.  ... 
doi:10.1145/2988545 fatcat:5llqb3ghnjgghh2yye4vqslz4y

A reconfigurable Crypto Sub System for the Software Communication Architecture

Michael Grand, Lilian Bossuet, Bertrand Le Gal, Dominique Dallet, Guy Gogniat
2009 MILCOM 2009 - 2009 IEEE Military Communications Conference  
In this paper, we describe the first non-confidential reconfigurable cryptoprocessor architecture for SSCA. We provide some area estimation of processor main parts on Xilinx Virtex 4 FPGA.  ...  But in the case of military applications, security is also a relevant aspect of SDR. The Secure Software Communication Architecture (SSCA) is a standardized solution to secure SDR.  ...  SSCA specifications suggest the use of secure MMU for memory access in order to enforce space memory isolation between CommB CPU processes. 2) Message Transport and Processing: Usually CORBA ORBs use the  ... 
doi:10.1109/milcom.2009.5379915 fatcat:pvkuleuzqjeppmxftg7g7mddzi

Discrete and Logico-Numerical Control for Dynamic Partial Reconfigurable FPGA-Based Embedded Systems: A Case Study

Soguy Mak-Kare Gueye, Gwenael Delaval, Eric Rutten, Jean-Philippe Diguet
2018 2018 IEEE Conference on Control Technology and Applications (CCTA)  
The reconfigurations need to be decided and controlled in a closed loop.  ...  Embedded systems need to be more and more self-adaptive, in order to better manage their constrained resources, and to better take into account evolutions in their environment and in their computing architecture  ...  Hence the manager keeps switching between hardware and software in order to try to satisfy the policy. b) Improving the objective to avoid oscillations: An additional policy prevents from selecting a version  ... 
doi:10.1109/ccta.2018.8511552 dblp:conf/ccta/GueyeDRD18 fatcat:c5kzchoyqfegbhk2xk3nzyqm7q

Designing secure systems on reconfigurable hardware

Ted Huffmire, Brett Brotherton, Nick Callegari, Jonathan Valamehr, Jeff White, Ryan Kastner, Tim Sherwood
2008 ACM Transactions on Design Automation of Electronic Systems  
Overcoming the practical problems of integrating multiple cores together with security mechanisms will help us to develop realistic security-policy specifications that drive enforcement mechanisms on embedded  ...  Embedded systems based on reconfigurable hardware integrate many functions onto a single device.  ...  A memory-access policy is expressed in a specialized language, and a compiler translates this policy directly to a circuit that enforces the policy.  ... 
doi:10.1145/1367045.1367053 fatcat:dwg22pbqb5c2vf7e7ko5tp4kdi

Proof-Carrying Hardware: Towards Runtime Verification of Reconfigurable Modules

Stephanie Drzevitzky, Uwe Kastens, Marco Platzner
2009 2009 International Conference on Reconfigurable Computing and FPGAs  
Dynamically reconfigurable hardware combines hardware performance with software-like flexibility and finds increasing use in networked systems.  ...  In this paper, we present proof-carrying hardware (PCH) as a novel approach to reconfigurable system security.  ...  Drawbridges are especially useful when also a reference monitor is invoked which enforces a memory policy specified for the intended access scenario.  ... 
doi:10.1109/reconfig.2009.31 dblp:conf/reconfig/DrzevitzkyKP09 fatcat:rsdkjgzkirgn7n432ildnkbxa4

A Domain-Specific Language for Autonomic Managers in FPGA Reconfigurable Architectures

Soguy Mak kare Gueye, Gwenael Delaval, Eric Rutten, Dominique Heller, Jean-Philippe Diguet
2018 2018 IEEE International Conference on Autonomic Computing (ICAC)  
The DSL relies on a behavioural modelling of these entities, targeted at the design of autonomic managers to control the reconfigurations in such a way as to enforce given policies and strategies.  ...  In this paper, we propose a Domain Specific Language (DSL) called Ctrl-DPR, allowing designers to easily generate Autonomic Managers.  ...  Manager enforcing the policy.  ... 
doi:10.1109/icac.2018.00021 dblp:conf/icac/GueyeDRHD18 fatcat:p6f6sfvmyfhc3mkjdx3krds4e4

A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration

Nelson Matthys, Christophe Huygens, Danny Hughes, Sam Michiels, Wouter Joosen
2012 2012 IEEE International Symposium on Policies for Distributed Systems and Networks  
A reconfigurable component model supports embedded developers during initial application development and enables management of evolving functional requirements, while an expressive policy language supports  ...  the specification and management of behavioural concerns by administrators or domain experts.  ...  ACKNOWLEDGMENTS This research is partially funded by the Interuniversity Attraction Poles Programme of the Belgian State of the Belgian Science Policy, the Flemish Agency for Innovation by Science and  ... 
doi:10.1109/policy.2012.17 dblp:conf/policy/MatthysHHMJ12 fatcat:xhdnzh3sfvesrjcu3ocorfkqtq

Secure Memory Management on Modern Hardware [article]

Reto Achermann, Nora Hossle, Lukas Humbel, Daniel Schwyn, David Cock, Timothy Roscoe
2020 arXiv   pre-print
In this paper we regain the ability to reason about and enforce access control using the proven concept of a reference monitor mediating accesses to memory resources.  ...  specifications.  ...  Our third contribution is the specification of an OS-agnostic reference monitor to enforce policy expressed in the above model, prototyped as an executable specification in Haskell, Policy enforcement  ... 
arXiv:2009.02737v1 fatcat:g7jvaw5msnd3bclqhi3xoae76m

Middleware for Dynamic Reconfiguration in Distributed Camera Systems

Milan Jovanovic, Bernhard Rinner
2007 2007 Fifth Workshop on Intelligent Solutions in Embedded Systems  
We have developed the services for dynamic reconfiguration using policies. Policies help to specify rules for the reconfiguration process.  ...  The reconfiguration is implemented using mobile agents in order to achieve a flexible and scalable middleware service. Our policy-based middleware is demonstrated by a surveillance application.  ...  In case of an alternate specification of conditions, more that one action can be send to the enforcement unit for execution.  ... 
doi:10.1109/wises.2007.4408495 dblp:conf/wises/JovanovicR07 fatcat:irpvkerutrd2lceqgwoqticerq

Modeling and Formal Control of Partial Dynamic Reconfiguration

Sebastien Guillet, Florent de Lamotte, Eric Rutten, Guy Gogniat, Jean-Philippe Diguet
2010 2010 International Conference on Reconfigurable Computing and FPGAs  
design of reconfiguration control.  ...  Information employed by the reconfiguration mechanism is identified to be extracted from MARTE models in order to synthesize a controller using a formal technique which significantly simplifies the correct  ...  Then it downloads the next configuration stream to memory and performs hardware reconfiguration when it receives a Ready signal from an impacted task.  ... 
doi:10.1109/reconfig.2010.56 dblp:conf/reconfig/GuilletLRGD10 fatcat:5u7obfl65ne7la4ahy4nzxano4

Multithreaded virtual-memory-enabled reconfigurable hardware accelerators

Miljan Vuletic, Paolo Ienne, Christopher Claus, Walter Stechele
2006 2006 IEEE International Conference on Field Programmable Technology  
Advanced programming concepts, such as multithreading, usually demand additional activities on the programmer side, to perform memory transfers and enforce memory consistency.  ...  Although naturally belonging to the user process, hardware parts of codesigned reconfigurable applications execute outside of the operating system (OS) process: they have neither unified memory abstraction  ...  coprocessors); on our side, we use the OS to provide transparent interfacing, unified memory address space and to enforce memory consistency between software and reconfigurable hardware running in the  ... 
doi:10.1109/fpt.2006.270312 dblp:conf/fpt/VuleticICS06 fatcat:twl3d6d7gvaztexhki6arxvxgi

Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems

Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan Kastner, Timothy Levin, Thuy Nguyen, Cynthia Irvine
2007 2007 IEEE Symposium on Security and Privacy (SP '07)  
To address this problem, the embedded systems community requires novel security primitives which address the realities of modern reconfigurable hardware.  ...  Blurring the line between software and hardware, reconfigurable devices strike a balance between the raw high speed of custom silicon and the post-fabrication flexibility of general-purpose processors.  ...  This research was funded in part by National Science Foundation Grant CNS-0524771, NSF Career Grant CCF-0448654, and the SMART Defense Scholarship for Service.  ... 
doi:10.1109/sp.2007.28 dblp:conf/sp/HuffmireBWSKLNI07 fatcat:e6fmmwdzxneg7fr5xcfygre24m
« Previous Showing results 1 — 15 out of 6,213 results