IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) 2012
DOI: 10.1109/dsn.2012.6263925
|View full text |Cite
|
Sign up to set email alerts
|

High-performance parallel accelerator for flexible and efficient run-time monitoring

Abstract: This paper proposes Harmoni, a high performance hardware accelerator architecture that can support a broad range of run-time monitoring and bookkeeping functions. Unlike custom hardware, which offers very little configurability after it has been fabricated, Harmoni is highly configurable and can allow a wide range of different hardware monitoring and bookkeeping functions to be dynamically added to a processing core even after the chip has already been fabricated. The Harmoni architecture achieves much higher … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
48
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(48 citation statements)
references
References 27 publications
(33 reference statements)
0
48
0
Order By: Relevance
“…While early systems supported a single hard-coded taint propagation policy, recent ones allow the policy to be defined in software [26,31,92] and support monitoring policies that go beyond taint tracking [19,31,32,76]. Harmoni [31], for example, provides a pair of caches that are quite similar to the SAFE rule cache. Possibly these could even be adapted to enforcing noninterference, in which case we expect the proof methodology introduced here to apply.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…While early systems supported a single hard-coded taint propagation policy, recent ones allow the policy to be defined in software [26,31,92] and support monitoring policies that go beyond taint tracking [19,31,32,76]. Harmoni [31], for example, provides a pair of caches that are quite similar to the SAFE rule cache. Possibly these could even be adapted to enforcing noninterference, in which case we expect the proof methodology introduced here to apply.…”
Section: Related Workmentioning
confidence: 99%
“…Hardware taint tracking The last decade has seen significant progress in specialized hardware for accelerating taint tracking [18,25,26,31,32,89,92]. Most commonly, a single tag bit is associated with each word to specify if it is tainted or not.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Aries sketches a vision for cached metadata propagation rules [11], and more recently Harmoni shows where a rule cache would fit in a programmable tag processing architecture [24], though neither shows how to map policies into rule tables or evaluates the runtime characteristics of rulecache-supported policies. FlexiTaint [66] is closest to our design; it demonstrates support for two taint propagation policies and their combination.…”
Section: Related Workmentioning
confidence: 99%
“…Hardware acceleration is thus an attractive alternative, especially in an era of cheap transistors. Many designs for hardware monitors have been proposed, with early designs focusing on enforcing single, hard-wired security policies [21], [22], [29], [71], [73], [79] and later ones evolving toward more programmable mechanisms [23], [31], [37], [38], [45], [70], [83] that allow quicker adaptation to a shifting attack landscape. Recent work has gone yet further in this direction by defining a generic, fully programmable hardware/software architecture for tag-based monitoring on a conventional processor extended with a Programmable Unit for Metadata Processing (PUMP) [39].…”
Section: Introductionmentioning
confidence: 99%