科技报告详细信息
Final report and documentation for the security enabled programmable switch for protection of distributed internetworked computers LDRD.
Van Randwyk, Jamie A. ; Robertson, Perry J. ; Durgin, Nancy Ann ; Toole, Timothy J. ; Kucera, Brent D. ; Campbell, Philip LaRoche ; Pierson, Lyndon George
关键词: COMPUTER ARCHITECTURE;    COMPUTERS;    DOCUMENTATION;    MONITORING;    SECURITY Computer security.;    Computer networks-Security measures.;    Distributed computer systems.;   
DOI  :  10.2172/984103
RP-ID  :  SAND2010-0516
PID  :  OSTI ID: 984103
Others  :  TRN: US201015%%1057
学科分类:社会科学、人文和艺术(综合)
美国|英语
来源: SciTech Connect
PDF
【 摘 要 】

An increasing number of corporate security policies make it desirable to push security closer to the desktop. It is not practical or feasible to place security and monitoring software on all computing devices (e.g. printers, personal digital assistants, copy machines, legacy hardware). We have begun to prototype a hardware and software architecture that will enforce security policies by pushing security functions closer to the end user, whether in the office or home, without interfering with users' desktop environments. We are developing a specialized programmable Ethernet network switch to achieve this. Embodied in this device is the ability to detect and mitigate network attacks that would otherwise disable or compromise the end user's computing nodes. We call this device a 'Secure Programmable Switch' (SPS). The SPS is designed with the ability to be securely reprogrammed in real time to counter rapidly evolving threats such as fast moving worms, etc. This ability to remotely update the functionality of the SPS protection device is cryptographically protected from subversion. With this concept, the user cannot turn off or fail to update virus scanning and personal firewall filtering in the SPS device as he/she could if implemented on the end host. The SPS concept also provides protection to simple/dumb devices such as printers, scanners, legacy hardware, etc. This report also describes the development of a cryptographically protected processor and its internal architecture in which the SPS device is implemented. This processor executes code correctly even if an adversary holds the processor. The processor guarantees both the integrity and the confidentiality of the code: the adversary cannot determine the sequence of instructions, nor can the adversary change the instruction sequence in a goal-oriented way.

【 预 览 】
附件列表
Files Size Format View
RO201704240003095LZ 1022KB PDF download
  文献评价指标  
  下载次数:5次 浏览次数:114次