Abstract

Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors are vulnerable to insider attacks that can catastrophically compromise security, integrity and privacy of computer systems. In this paper, we describe several methods to strengthen the fundamental assumption about trust in microprocessors. By employing practical, lightweight attack detectors within a microprocessor, we show that it is possible to protect against malicious logic embedded in microprocessor hardware. We propose and evaluate two area-efficient hardware methods - TrustNet and DataWatch - that detect attacks on microprocessor hardware by knowledgeable, malicious insiders. Our mechanisms leverage the fact that multiple components within a microprocessor (e.g., fetch, decode pipeline stage etc.) must necessarily coordinate and communicate to execute even simple instructions, and that any attack on a microprocessor must cause erroneous communications between micro architectural subcomponents used to build a processor. A key aspect of our solution is that TrustNet and DataWatch are themselves highly resilient to corruption. We demonstrate that under realistic assumptions, our solutions can protect pipelines and on-chip cache hierarchies at negligible area cost and with no performance impact. Combining TrustNet and DataWatch with prior work on fault detection has the potential to provide complete coverage against a large class of microprocessor attacks.


Original document

The different versions of the original document can be found in:

http://oakland31.cs.virginia.edu/slides/waksman.pdf,
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000005504715,
https://ieeexplore.ieee.org/document/5504715,
https://dblp.uni-trier.de/db/conf/sp/sp2010.html#WaksmanS10,
http://oakland10.cs.virginia.edu/slides/waksman.pdf,
http://www.utdallas.edu/~gxm112130/CE7V80SP16/tamper-evident.pdf,
https://dl.acm.org/citation.cfm?id=1849973,
https://doi.org/10.1109/SP.2010.19,
https://doi.ieeecomputersociety.org/10.1109/SP.2010.19,
http://ieeexplore.ieee.org/document/5504715/citations,
http://castl.cs.columbia.edu/papers/oakland10_temp.pdf,
http://a51.nl/storage/pdf/TEMP_Oakland10.pdf,
https://academic.microsoft.com/#/detail/1988712140
http://dx.doi.org/10.1109/sp.2010.19
Back to Top

Document information

Published on 01/01/2010

Volume 2010, 2010
DOI: 10.1109/sp.2010.19
Licence: CC BY-NC-SA license

Document Score

0

Views 0
Recommendations 0

Share this document

Keywords

claim authorship

Are you one of the authors of this document?