Filters








17 Hits in 3.8 sec

FlexiTaint: A programmable accelerator for dynamic taint propagation

Guru Venkataramani, Ioannis Doudalis, Yan Solihin, Milos Prvulovic
2008 High-Performance Computer Architecture  
This paper presents FlexiTaint, a hardware accelerator for dynamic taint propagation.  ...  The taint propagation scheme is specified via a software handler that, given the operation and the sources' taints, computes the new taint for the result.  ...  This paper introduces FlexiTaint, a programmable accelerator for taint propagation.  ... 
doi:10.1109/hpca.2008.4658637 dblp:conf/hpca/VenkataramaniDSP08 fatcat:wshpbjxxfnaq7l34jshwpgmvmm

Effective and Efficient Memory Protection Using Dynamic Tainting

Ioannis Doudalis, James Clause, Guru Venkataramani, Milos Prvulovic, Alessandro Orso
2012 IEEE transactions on computers  
Taint marks are then propagated and checked every time a memory address m is accessed through a pointer p; if the associated taint marks differ, an illegal access is reported.  ...  We present a new dynamic tainting technique to detect illegal memory accesses. When memory is allocated, at runtime, we taint both the memory and the corresponding pointer using the same taint mark.  ...  However, we do expect that further work on programmable taint propagation accelerators to eventually allow an efficient implementation of our technique using a programmable DIFT accelerator.  ... 
doi:10.1109/tc.2010.215 fatcat:42cilvqzbrcd7jdymusg6kq3ui

Architectural Support for Software-Defined Metadata Processing

Udit Dhawan, Catalin Hritcu, Raphael Rubin, Nikos Vasilakis, Silviu Chiricescu, Jonathan M. Smith, Thomas F. Knight, Benjamin C. Pierce, Andre DeHon
2015 SIGARCH Computer Architecture News  
Optimized hardware for propagating and checking softwareprogrammable metadata tags can achieve low runtime overhead.  ...  We demonstrate this by using it to enforce four diverse safety and security policies-spatial and temporal memory safety, taint tracking, control-flow integrity, and code and data separation-plus a composite  ...  FlexiTaint [66] is closest to our design; it demonstrates support for two taint propagation policies and their combination.  ... 
doi:10.1145/2786763.2694383 fatcat:ftendh3zdreijfp76mjmrw4kzm

Architectural Support for Software-Defined Metadata Processing

Udit Dhawan, Catalin Hritcu, Raphael Rubin, Nikos Vasilakis, Silviu Chiricescu, Jonathan M. Smith, Thomas F. Knight, Benjamin C. Pierce, Andre DeHon
2015 Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '15  
Optimized hardware for propagating and checking softwareprogrammable metadata tags can achieve low runtime overhead.  ...  We demonstrate this by using it to enforce four diverse safety and security policies-spatial and temporal memory safety, taint tracking, control-flow integrity, and code and data separation-plus a composite  ...  FlexiTaint [66] is closest to our design; it demonstrates support for two taint propagation policies and their combination.  ... 
doi:10.1145/2694344.2694383 dblp:conf/asplos/DhawanHRVCSKPD15 fatcat:wxxet3mq4fb2zfbk6blynpno2e

Architectural Support for Software-Defined Metadata Processing

Udit Dhawan, Catalin Hritcu, Raphael Rubin, Nikos Vasilakis, Silviu Chiricescu, Jonathan M. Smith, Thomas F. Knight, Benjamin C. Pierce, Andre DeHon
2015 SIGPLAN notices  
Optimized hardware for propagating and checking softwareprogrammable metadata tags can achieve low runtime overhead.  ...  We demonstrate this by using it to enforce four diverse safety and security policies-spatial and temporal memory safety, taint tracking, control-flow integrity, and code and data separation-plus a composite  ...  FlexiTaint [66] is closest to our design; it demonstrates support for two taint propagation policies and their combination.  ... 
doi:10.1145/2775054.2694383 fatcat:jkc4s5vrbfcbhaqstaj65mk77y

High-performance parallel accelerator for flexible and efficient run-time monitoring

Daniel Y. Deng, G. Edward Suh
2012 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)  
We implemented an RTL prototype of Harmoni and evaluated it with several example monitoring functions for security and programmability.  ...  functions to be dynamically added to a processing core even after the chip has already been fabricated.  ...  In DIFT, ALU instructions propagate taint information between registers, memory instructions propagate taint information between registers and memory, and taint is checked on control transfer instructions  ... 
doi:10.1109/dsn.2012.6263925 dblp:conf/dsn/DengS12 fatcat:qdoiyu6i2fdafocud2sw3vp54u

FADE: A programmable filtering accelerator for instruction-grain monitoring

Sotiria Fytraki, Evangelos Vlachos, Onur Kocberber, Babak Falsafi, Boris Grot
2014 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)  
This work generalizes and extends prior point solutions into a programmable filtering accelerator affording vast flexibility and at-speed event filtering.  ...  A unique feature of the proposed design is the ability to dynamically resolve dependencies between unfilterable events and subsequent events, eliminating data-dependent stalls and maximizing accelerator's  ...  For TaintCheck, we use the benchmarks (astar, bzip, mcf, omnetpp) that have tainting propagation and we exclude the rest.  ... 
doi:10.1109/hpca.2014.6835922 dblp:conf/hpca/FytrakiVKFG14 fatcat:nc4v4tuuefftvo3ji4miiuymeu

WHISK: An uncore architecture for Dynamic Information Flow Tracking in heterogeneous embedded SoCs

Joel Porquet, Simha Sethumadhavan
2013 2013 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS)  
In this paper, we describe for the first time, how Dynamic Information Flow Tracking (DIFT) can be implemented for heterogeneous designs that contain one or more on-chip accelerators attached to a network-on-chip  ...  Based on this observation we present a new system architecture for implementing DIFT, and also describe wrappers that provide DIFT functionality for thirdparty IP components.  ...  Within the processor, the propagation policy distinguishes four categories of instructions providing simple rules for each one (e.g., for a computation-copy instruction, the taint of the result receives  ... 
doi:10.1109/codes-isss.2013.6658991 dblp:conf/codes/PorquetS13 fatcat:3rdjqj44onb35gwwh5ryceid2y

A case for unlimited watchpoints

Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd Austin
2012 Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12  
As an example of the power of such a system, it is possible to use watchpoints to accelerate read/write set checks in a software data race detector by nearly 9×.  ...  We describe a hardware design that stores watchpoints in main memory and utilizes two different on-chip caches to accelerate performance.  ...  Thanks also to Qin Zhao for providing the Umbra code used in our experiments.  ... 
doi:10.1145/2150976.2150994 dblp:conf/asplos/GreathouseXLA12 fatcat:sirwrqqo4zenllc3fn2kpgps6e

A case for unlimited watchpoints

Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd Austin
2012 SIGARCH Computer Architecture News  
As an example of the power of such a system, it is possible to use watchpoints to accelerate read/write set checks in a software data race detector by nearly 9×.  ...  We describe a hardware design that stores watchpoints in main memory and utilizes two different on-chip caches to accelerate performance.  ...  Thanks also to Qin Zhao for providing the Umbra code used in our experiments.  ... 
doi:10.1145/2189750.2150994 fatcat:tgjib5rsabfidiwgikxdzcgjie

From Speculation to Security

Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-chung Yew, Frederic T. Chong
2008 SIGARCH Computer Architecture News  
Based on this observation, we propose SHIFT, a low-overhead, software-based dynamic information flow tracking system to detect a wide range of attacks.  ...  Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks.  ...  Acknowledgment The authors thank Frans Kaashoek and the anonymous reviewers for their insightful comments. This research was funded by China National 973 Plan under grant numbered 2005CB321905.  ... 
doi:10.1145/1394608.1382156 fatcat:4rfuygu6vjgh5jmb5k7dt5ubmu

From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware

Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-chung Yew, Frederic T. Chong
2008 2008 International Symposium on Computer Architecture  
Based on this observation, we propose SHIFT, a low-overhead, software-based dynamic information flow tracking system to detect a wide range of attacks.  ...  Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks.  ...  Acknowledgment The authors thank Frans Kaashoek and the anonymous reviewers for their insightful comments. This research was funded by China National 973 Plan under grant numbered 2005CB321905.  ... 
doi:10.1109/isca.2008.18 dblp:conf/isca/ChenWYZYC08 fatcat:yjpye3xdfncgljndzhmu3jm6n4

Flexible and Efficient Instruction-Grained Run-Time Monitoring Using On-Chip Reconfigurable Fabric

Daniel Y. Deng, Daniel Lo, Greg Malysa, Skyler Schneider, G. Edward Suh
2010 2010 43rd Annual IEEE/ACM International Symposium on Microarchitecture  
functions to be dynamically added to the processing core and adapt to application needs even after the chip has been fabricated.  ...  FlexCore provides an efficient platform that can support a broad range of run-time monitoring and bookkeeping techniques.  ...  As another example, FlexiTaint [13] supports DIFT operations with a fully programmable tag propagation and check policies.  ... 
doi:10.1109/micro.2010.17 dblp:conf/micro/DengLMSS10 fatcat:htxhhfdrmvfm3lwbqtlditg22i

MemTracker

Guru Venkataramani, Ioannis Doudalis, Yan Solihin, Milos Prvulovic
2009 ACM Transactions on Architecture and Code Optimization (TACO)  
MemTracker associates each word of data in memory with a few bits of state, and uses a programmable state transition table to react to different events that can affect this state.  ...  Existing software and hardware approaches for finding and identifying memory bugs have a number of drawbacks including considerable performance overheads, target only a specific type of bug, implementation  ...  FlexiTaint targets a different problem domain: hardware acceleration of dynamic taint propagation, which associates a "taint" with each value (in memory or registers) and propagates taints as values are  ... 
doi:10.1145/1543753.1543754 fatcat:n3xdhxjnlbetrgoj5jf7izywve

Execution leases

Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederic T. Chong, Timothy Sherwood
2009 Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture - Micro-42  
In this paper we propose a new method for creating architectures that both a) makes the complete information-flow properties of the machine fully explicit and available to the programmer and b) allows  ...  High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the control of media for entertainment  ...  The authors would like to thank the anonymous reviewers for providing useful comments on this paper.  ... 
doi:10.1145/1669112.1669174 dblp:conf/micro/TiwariLWCS09 fatcat:fr7k3kfglvfrdofvf4x7gi5ige
« Previous Showing results 1 — 15 out of 17 results