Memory-Centric Security Architecture
نویسندگان
چکیده
This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for the same purpose, the new architecture ties cryptographic properties and security attributes to memory instead of each individual user process. The advantages of such a memory centric design are many folds. First, it provides a better security model and access control on software privacy that supports both selective and mixed tamper resistant protection on software components from heterogeneous sources. Second, the new model supports and facilities tamper resistant secure information sharing in an open software system where both data and code components could be shared by different user processes. Third, the proposed security model and secure processor design allow software components protected with different security policies to inter-operate within the same memory space efficiently. Our new architectural support requires small silicon resources and its performance impact is minimal based on our experimental results using commercial MS Windows workloads and cycle based out-of-order processor simulation.
منابع مشابه
Beyond Processor-centric Operating Systems
By the end of the decade, computing designs will shift from a processor-centric architecture to a memorycentric architecture. At rack scale, we can expect a large pool of non-volatile memory (NVM) that will be accessed by heterogeneous and decentralized compute resources [3, 17]. Such memory-centric architectures will present challenges that today’s processor-centric OSes may not be able to add...
متن کاملFIA: Collaborative Research: Named Data Networking (NDN)
2 Architecture 2 2.1 Architectural Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 The NDN Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2.1 Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2.2 Data-Centric Security . . . . . . . . . . . . . . . . ...
متن کاملA data-centric capability-focused approach for system-of-systems architecture modeling and analysis
1-15, doi:10.1002/sys.21253. analysis architecture capability data data-centric executable highlevel meta-model model system-of-systems. A data-centric capability-focused approach for system-of-systems architecture modeling and analysis. data-centric capability-focused approach for system-of-systems architecture modeling and analysis on the International top journal Systems. Bingfeng Ge, Keith ...
متن کاملFIA-NP: Collaborative Research: Named Data Networking
2 Architecture 2 2.1 Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Data-Centric Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.3 Adaptive Routing and Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.4 In-Network Storage . . . . . . . . . . . . . . . . ....
متن کاملArchitecting Smart Home Environments for Healthcare: A Database-Centric Approach
Considering existing system architectures for smart environments, the database management system (DBMS) is the most common but the least exploited architectural component, devoted exclusively for data storage and retrieval. However, database technology has advanced and matured considerably over the years, and, as a result, current DBMSs can be and do more. The scope of this thesis is therefore ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005