2006
DOI: 10.1007/11863908_28
|View full text |Cite
|
Sign up to set email alerts
|

Policy-Driven Memory Protection for Reconfigurable Hardware

Abstract: Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection. Several reconfigurable cores are often integrated onto a single chip where they share external resources such as memory. While this enables small form factor and low cost designs, it opens up the opportunity for modules to intercept or even interfere with the operation of one another. We inve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 32 publications
0
21
0
Order By: Relevance
“…Huffmire et al [9] demonstrate compiler translation of an access policy into a hardware execution monitor for enforcing policies such as compartmentalization, access control, secure hand-off, Chinese wall, and redaction. This execution monitor is meant for hardware designs with isolated circuitry that communicate through the monitor and is not applicable directly to software applications that share hardware resources, but compilation tools for security policies may benefit our approach.…”
Section: Related Workmentioning
confidence: 99%
“…Huffmire et al [9] demonstrate compiler translation of an access policy into a hardware execution monitor for enforcing policies such as compartmentalization, access control, secure hand-off, Chinese wall, and redaction. This execution monitor is meant for hardware designs with isolated circuitry that communicate through the monitor and is not applicable directly to software applications that share hardware resources, but compilation tools for security policies may benefit our approach.…”
Section: Related Workmentioning
confidence: 99%
“…The modules can only use the bus through this arbiter, which only allows each module to read during its designated time slice. If we want to connect the bus to a memory, then a memory monitor is also required; for this work we assume that such a configuration can be implemented on the FPGA using the results of our previous work [Huffmire et al 2006].…”
Section: Efficient Communication Under the Drawbridge Modelmentioning
confidence: 99%
“…Since the space of intrusion detection rule sets is infinite, the space of detection cores is also infinite. In our earlier work [Huffmire et al 2006], we developed a memory protection scheme for reconfigurable hardware in which a reconfigurable reference monitor enforces a policy that specifies the legal sharing of memory. Partial reconfiguration could allow the system to change the policy being enforced by swapping in a different reference monitor, assuming that you could overcome the very difficult challenge of ensuring the security and correctness of the handover.…”
Section: Effective Scrubbing and Reuse Of Reconfigurable Hardwarementioning
confidence: 99%
See 2 more Smart Citations