Low-overhead architecture for security tag

被引:6
|
作者
Shioya, Ryota [1 ]
Kim, Daewung [1 ]
Horio, Kazuo [1 ]
Goshima, Masahiro [1 ]
Sakai, Shuichi [1 ]
机构
[1] Univ Tokyo, Grad Sch Informat Sci & Technol, Tokyo 1138654, Japan
关键词
Dependable Architecture; Tagged Architecture; Information security; DIFT; Multi-level table;
D O I
10.1109/PRDC.2009.30
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A security-tagged architecture is one that applies tags on data to detect attack or information leakage, tracking data flow. The previous studies using security-tagged architecture mostly focused on how to utilize tags, not how the tags are implemented. A naive implementation of tags simply adds a tag field to every byte of the cache and the memory. Such technique, however, results in a huge hardware overhead. This paper proposes a low-overhead tagged architecture. We achieve our goal by exploiting some properties of tag, the non-uniformity and the locality of reference. Our design includes a use of uniquely designed multi-level table and various cache-like structures, all contributing to exploit these properties. Under simulation, our method was able to limit the memory overhead to 1.8%, where a naive implementation suffered 12.5% overhead.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 50 条
  • [21] On the Generation of Binary functions with Low-Overhead
    Voyiatzis, I.
    Efstathiou, C.
    2017 12TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2017), 2017,
  • [22] Low-Overhead Accrual Failure Detector
    Ren, Xiao
    Dong, Jian
    Liu, Hongwei
    Li, Yang
    Yang, Xiaozong
    SENSORS, 2012, 12 (05): : 5815 - 5823
  • [23] Low-Overhead Vlrtualization of Mobile Platforms
    Heiser, Gernot
    PROCEEDINGS OF THE PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURES AND SYNTHESIS FOR EMBEDDED SYSTEMS (CASES '11), 2011, : 3 - 3
  • [24] LoGV: Low-overhead GPGPU Virtualization
    Gottschlag, Mathias
    Hillenbrand, Marius
    Kehne, Jens
    Stoess, Jan
    Bellosa, Frank
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1721 - 1726
  • [25] LOW-OVERHEAD SCHEDULING OF NESTED PARALLELISM
    HUMMEL, SF
    SCHONBERG, E
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1991, 35 (5-6) : 743 - 765
  • [26] Compiler-directed region-based security for low-overhead software protection
    Kongubangaram, Vijay
    Gelbart, Olga
    Simha, Rahul
    Narahari, Bhagirath
    DASC 2007: THIRD IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2007, : 47 - +
  • [27] LIFT: A low-overhead practical information flow tracking system for detecting security attacks
    Qin, Feng
    Wang, Cheng
    Li, Zhenmin
    Kim, Ho-seop
    Zhou, Yuanyuan
    Wu, Youfeng
    MICRO-39: PROCEEDINGS OF THE 39TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, 2006, : 135 - +
  • [28] An architecture interface and offload model for low-overhead, near-data, distributed accelerators
    Baskaran, Saambhavi
    Kandemir, Mahmut Taylan
    Sampson, Jack
    2022 55TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2022, : 1160 - 1177
  • [29] Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System
    Corrick, Tristan
    Kumar, Vimal
    UBIQUITOUS SECURITY, 2022, 1557 : 189 - 202
  • [30] Low-Voltage Low-Overhead Asynchronous Logic
    Sridharan, Akshay
    Sechen, Carl
    Jafari, Roozbeh
    2013 IEEE INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN (ISLPED), 2013, : 261 - 266