学位论文详细信息
Design and evaluation of information flow signature for secure computation of applications
Information Flow Signature\r(IFS)
Patel, Prateek ; Iyer ; Ravishankar K. ; Kalbarczyk ; Zbigniew T.
关键词: Information Flow Signature\r(IFS);   
Others  :  https://www.ideals.illinois.edu/bitstream/handle/2142/34511/Patel_Prateek.pdf?sequence=1&isAllowed=y
美国|英语
来源: The Illinois Digital Environment for Access to Learning and Scholarship
PDF
【 摘 要 】

This thesis presents an architectural solution that provides secure and reliable execution of an application that computes critical data, in spite of potential hardware and software vulnerabilities. The technique does not require source code of or specifications about the malicious library function(s) called during execution of an application. The solution is based on the concept of Information Flow Signatures (IFS). The technique uses both a model-checker-based symbolic fault injection analysis tool called SymPLFIED to generate an IFS for an application or operating system, and runtime signature checking at the level of hardware to protect the integrity of critical data. The runtime checking is implemented in the IFS module. Reliable computation of data is ensured by the critical value re-computation (CVR) module.Prototype implementation of the signature checking and reliability module on a soft processor within an FPGA incurs no performance overhead and about 12% chip area overhead. The security module itself incurs about 7.5% chip area overhead. Performance evaluations indicate that the IFS module incurs as little as 3-4% overhead compared to 88-100% overhead when the runtime checking is implemented as a part of software. Preliminary testing indicates that the technique can provide 100% coverage for insider attacks that manifest as memory corruption and change the architectural state of the processor. Hence the IFS and CVR implementation offers a flexible, low-overhead, high-coverage method for ensuring reliable and secure computing.

【 预 览 】
附件列表
Files Size Format View
Design and evaluation of information flow signature for secure computation of applications 2760KB PDF download
  文献评价指标  
  下载次数:18次 浏览次数:14次