Back to Search Start Over

Position Paper:Defending Direct Memory Access with CHERI Capabilities

Authors :
John Baldwin
Simon W. Moore
A. Theodore Markettos
Peter G. Neumann
Robert N. M. Watson
Ruslan Bukin
Source :
HASP@MICRO
Publication Year :
2020
Publisher :
ACM, 2020.

Abstract

We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security. Previous work has shown that existing defenses are insufficient and poorly deployed, in part due to performance concerns. In this paper we explore the threat and its implications for system architecture. We propose a range of protection techniques, from lightweight to heavyweight, across different classes of systems. We consider how emerging capability architectures (and specifically the CHERI protection model) can enhance protection and provide a convenient bridge to describe interactions among software and hardware components. Finally, we describe how new schemes may be more efficient than existing defenses.

Details

Database :
OpenAIRE
Journal :
Hardware and Architectural Support for Security and Privacy
Accession number :
edsair.doi...........eb5475a32ff51bc1d520d25f321872f9