본문

서브메뉴

Language-Based Techniques for Building Timing Channel Secure Hardware-Software Systems- [electronic resource]
ข้อมูลเนื้อหา
Language-Based Techniques for Building Timing Channel Secure Hardware-Software Systems- [electronic resource]
자료유형  
 학위논문
Control Number  
0016934030
International Standard Book Number  
9798380318198
Dewey Decimal Classification Number  
004
Main Entry-Personal Name  
Zagieboylo, Drew.
Publication, Distribution, etc. (Imprint  
[S.l.] : Cornell University., 2023
Publication, Distribution, etc. (Imprint  
Ann Arbor : ProQuest Dissertations & Theses, 2023
Physical Description  
1 online resource(241 p.)
General Note  
Source: Dissertations Abstracts International, Volume: 85-03, Section: B.
General Note  
Advisor: Myers, Andrew.
Dissertation Note  
Thesis (Ph.D.)--Cornell University, 2023.
Restrictions on Access Note  
This item must not be sold to any third party vendors.
Summary, Etc.  
요약We rely on a deep stack of abstractions to efficiently build software applications without having to completely understand the nuance of language runtimes, operating systems, and processor architectures. Each layer in the stack relies on the guarantees of the layer below, with all software relying on the functionality provided by the hardware on which it executes.Similarly, when we build secure software, we define security in terms of high level application policies and rely on a stack of abstractions to enforce those policies. Therefore, all of software security relies on the guarantees provided by processor hardware. However, those guarantees offer less protection than we have traditionally assumed, and real processor implementations routinely exhibit vulnerabilities that undermine traditional assumptions about hardware behavior.Modern processors incorporate a host of optimizations to execute software as quickly and efficiently as possible; unfortunately, these optimizations are at the root of some serious security weaknesses. In particular, researchers have recently discovered easily exploitable timing-channel vulnerabilities that arise due to processor speculation, like Spectre, Meltdown, and the many variants that have since been uncovered. Concerningly, these vulnerabilities are not the result of cutting-edge, untested optimizations; they are fundamental to the designs of almost all processors in the last 20 years.The existence of these vulnerabilities highlights the need for a well-defined contract between software and hardware that does not allow the hardware to leak software's secrets arbitrarily, especially via timing channels. Furthermore, we need tools to enable the construction and verification of secure processors that adhere to these new contracts. As functional processor correctness is already a difficult verification problem, we likely need new approaches to prove processor security.This dissertation addresses the above concerns by applying Information Flow Control (IFC) to both the hardware-software interface and to Hardware Description Languages (HDL) themselves. By using IFC as the de facto language of security, we can define a hardware-software contract capable of providing timing-channel security without exposing extraneous details about processor internals. Intuitively, using IFC as a tool to then build processors also enables proving that real processor implementations refine this IFC contract.This dissertation also addresses the problem of constructing correct processors by introducing a high-level HDL that targets the design of efficient processor pipelines. By raising the abstraction of hardware design, we can more easily connect the implementation's semantics to the hardware-software contract. We can also reason statically about complex optimizations such as speculation by providing abstractions that generate correct circuitry by construction. We hope that future processors and interfaces are designed with timing-channel security in mind, and that these new abstractions will percolate back up the software stack to make timing-channel security available and efficient for all applications.
Subject Added Entry-Topical Term  
Computer science.
Subject Added Entry-Topical Term  
Computer engineering.
Subject Added Entry-Topical Term  
Information technology.
Index Term-Uncontrolled  
Computer architectures
Index Term-Uncontrolled  
Computer security
Index Term-Uncontrolled  
Information Flow Control
Index Term-Uncontrolled  
Programming languages
Index Term-Uncontrolled  
Hardware Description Languages
Added Entry-Corporate Name  
Cornell University Computer Science
Host Item Entry  
Dissertations Abstracts International. 85-03B.
Host Item Entry  
Dissertation Abstract International
Electronic Location and Access  
로그인을 한후 보실 수 있는 자료입니다.
Control Number  
joongbu:641081
New Books MORE
최근 3년간 통계입니다.

ค้นหาข้อมูลรายละเอียด

  • จองห้องพัก
  • 캠퍼스간 도서대출
  • 서가에 없는 책 신고
  • โฟลเดอร์ของฉัน
วัสดุ
Reg No. Call No. ตำแหน่งที่ตั้ง สถานะ ยืมข้อมูล
TQ0026999 T   원문자료 열람가능/출력가능 열람가능/출력가능
마이폴더 부재도서신고

* จองมีอยู่ในหนังสือยืม เพื่อให้การสำรองที่นั่งคลิกที่ปุ่มจองห้องพัก

해당 도서를 다른 이용자가 함께 대출한 도서

Related books

Related Popular Books

도서위치