Patrick Jungwirth, W. M. Crowe, Tom Barnett, Linton Salmon. Darpassith, Program Manager
{"title":"安本架构:信息流监控和跟踪","authors":"Patrick Jungwirth, W. M. Crowe, Tom Barnett, Linton Salmon. Darpassith, Program Manager","doi":"10.1117/12.3014162","DOIUrl":null,"url":null,"abstract":"Saltzer and Schroeder’s security principles define complete mediation as to verify all access rights and authority. Conventional architectures focus on speed at all costs using predictors, caches, out-of-order execution, speculative execution, etc. A new approach is required to overcome the limitations of conventional architectures: the clock speed differential between a microprocessor and memory, and the resulting self-imposed, never-ending cyber security problems. The Aberdeen Architecture uses the cache bank pipeline memory architecture from the Redstone Architecture to overcome some of the speed differential between a microprocessor and memory. The trusted computing base uses hardware state machine monitors (hardware-based nano-operating system kernels). The state machine monitors use register and memory tags to manage and track information flows during instruction execution. The Aberdeen Architecture tracks and monitors four information flows: data flow integrity, memory access flow integrity, control flow integrity, and instruction execution flow integrity. All information flows are data flow driven. The state machine monitors completely virtualize the execution pipeline. The Aberdeen Architecture achieves near complete mediation for instruction execution. This paper focuses on data flow integrity and memory access flow integrity.","PeriodicalId":178341,"journal":{"name":"Defense + Commercial Sensing","volume":"68 1","pages":"130580N - 130580N-17"},"PeriodicalIF":0.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Aberdeen architecture: information flow monitoring and tracking\",\"authors\":\"Patrick Jungwirth, W. M. Crowe, Tom Barnett, Linton Salmon. Darpassith, Program Manager\",\"doi\":\"10.1117/12.3014162\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Saltzer and Schroeder’s security principles define complete mediation as to verify all access rights and authority. Conventional architectures focus on speed at all costs using predictors, caches, out-of-order execution, speculative execution, etc. A new approach is required to overcome the limitations of conventional architectures: the clock speed differential between a microprocessor and memory, and the resulting self-imposed, never-ending cyber security problems. The Aberdeen Architecture uses the cache bank pipeline memory architecture from the Redstone Architecture to overcome some of the speed differential between a microprocessor and memory. The trusted computing base uses hardware state machine monitors (hardware-based nano-operating system kernels). The state machine monitors use register and memory tags to manage and track information flows during instruction execution. The Aberdeen Architecture tracks and monitors four information flows: data flow integrity, memory access flow integrity, control flow integrity, and instruction execution flow integrity. All information flows are data flow driven. The state machine monitors completely virtualize the execution pipeline. The Aberdeen Architecture achieves near complete mediation for instruction execution. This paper focuses on data flow integrity and memory access flow integrity.\",\"PeriodicalId\":178341,\"journal\":{\"name\":\"Defense + Commercial Sensing\",\"volume\":\"68 1\",\"pages\":\"130580N - 130580N-17\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Defense + Commercial Sensing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.3014162\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Defense + Commercial Sensing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.3014162","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Aberdeen architecture: information flow monitoring and tracking
Saltzer and Schroeder’s security principles define complete mediation as to verify all access rights and authority. Conventional architectures focus on speed at all costs using predictors, caches, out-of-order execution, speculative execution, etc. A new approach is required to overcome the limitations of conventional architectures: the clock speed differential between a microprocessor and memory, and the resulting self-imposed, never-ending cyber security problems. The Aberdeen Architecture uses the cache bank pipeline memory architecture from the Redstone Architecture to overcome some of the speed differential between a microprocessor and memory. The trusted computing base uses hardware state machine monitors (hardware-based nano-operating system kernels). The state machine monitors use register and memory tags to manage and track information flows during instruction execution. The Aberdeen Architecture tracks and monitors four information flows: data flow integrity, memory access flow integrity, control flow integrity, and instruction execution flow integrity. All information flows are data flow driven. The state machine monitors completely virtualize the execution pipeline. The Aberdeen Architecture achieves near complete mediation for instruction execution. This paper focuses on data flow integrity and memory access flow integrity.