CRII: SaTC: Detecting Security Vulnerabilities in Instruction Set Architectures
CRII:SaTC:检测指令集架构中的安全漏洞
基本信息
- 批准号:1464209
- 负责人:
- 金额:$ 17.5万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2015
- 资助国家:美国
- 起止时间:2015-05-15 至 2017-12-31
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
The interaction between computer processors -- the hardware at the heart of our computers, tablets, and phones -- and software -- apps, web browsers, and other applications -- is governed by an Instruction Set Architecture (ISA). The ISA is the specification that defines how the processor will respond to commands from the software. It is large and complex, too large for a person to understand and reason about all the interactions between different parts completely. As a result, security vulnerabilities exist in the ISA. These vulnerabilities can sometimes be exploited by attackers to steal data or take control of the machine. This research is about detecting security vulnerabilities that exist in the ISA. Finding and removing these vulnerabilities will create a more secure foundation for all our computing activities. This will benefit government agencies that require high assurance environments, cloud providers that rely on hardware features for the security for their service, and users who, more and more, are relying on diverse hardware components from a variety of hardware design companies to handle their private and sensitive data.The researchers posit that vulnerabilities in the ISA happen in one of two ways: 1) Erroneous specification: the ISA prescribes behavior that is dangerous; or 2) Nondeterminism in the specification: the ISA is incomplete and one of the possible behaviors allowed by the specification is dangerous. The hypothesis of this research is that it is possible to focus on a relatively small subset of the ISA for which these types of errors are likely to occur. The researchers are developing a practical methodology for discovering for which instructions vulnerabilities are most likely to occur. With that information, they are developing tools to detect and correct security-critical errors in the ISA. In addition to making a practical contribution, the research activities are improving understanding in the computer science community of what a vulnerability in an ISA looks like and where and under what conditions it is likely to occur. This will enable future verification efforts to concentrate on the most security-critical aspects of the ISA.
计算机处理器之间的交互 - 计算机,平板电脑和电话的核心 - 以及软件 - 应用程序,Web浏览器和其他应用程序 - 由指令集体系结构(ISA)控制。 ISA是定义处理器如何响应软件命令的规范。它既大又复杂,太大了,以至于一个人完全理解和理解不同部分之间的所有相互作用。结果,ISA中存在安全漏洞。攻击者有时可以利用这些漏洞来窃取数据或控制机器。这项研究是关于检测ISA中存在的安全漏洞。查找和消除这些漏洞将为我们的所有计算活动创造更安全的基础。这将使需要高保证环境的政府机构,依靠硬件功能为其服务安全的云提供商以及越来越多的用户依靠各种硬件设计公司的各种硬件组件来处理其私人研究人员认为,ISA中的脆弱性以两种方式之一发生:1)错误规范:ISA规定了危险的行为;或2)规范中的无确定性:ISA不完整,规范允许的可能行为之一是危险的。 这项研究的假设是,可以专注于可能发生这些类型错误的ISA的相对较小的子集。 研究人员正在开发一种实用方法,以发现最有可能发生的指令漏洞。有了这些信息,他们正在开发工具以检测和纠正ISA中的关键安全错误。 除了做出实际贡献外,研究活动还在改善计算机科学界的理解,即ISA中的脆弱性以及可能发生的条件下以及在哪里以及在哪里以及在哪里发生。这将使未来的验证工作专注于ISA的最关键安全方面。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Cynthia Sturton其他文献
Cynthia Sturton的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Cynthia Sturton', 18)}}的其他基金
Collaborative Research: SaTC: CORE: Medium: Hardware Security Insights: Analyzing Hardware Designs to Understand and Assess Security Weaknesses and Vulnerabilities
协作研究:SaTC:核心:中:硬件安全见解:分析硬件设计以了解和评估安全弱点和漏洞
- 批准号:
2247754 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Continuing Grant
SaTC: STARSS: Small: Tackling the Corner Cases: Finding Security Vulnerabilities in CPU Designs
SaTC:STARSS:小型:解决极端情况:查找 CPU 设计中的安全漏洞
- 批准号:
1816637 - 财政年份:2018
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
EAGER: Identifying Security Critical Properties of a Processor
EAGER:识别处理器的安全关键属性
- 批准号:
1651276 - 财政年份:2016
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
CPS: Frontier: Collaborative Research: VeHICaL: Verified Human Interfaces, Control, and Learning for Semi-Autonomous Systems
CPS:前沿:协作研究:VeHCaL:半自主系统的经过验证的人机界面、控制和学习
- 批准号:
1544924 - 财政年份:2016
- 资助金额:
$ 17.5万 - 项目类别:
Continuing Grant
相似海外基金
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338301 - 财政年份:2024
- 资助金额:
$ 17.5万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 17.5万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Small: Detecting and Localizing Non-Functional Vulnerabilities in Machine Learning Libraries
协作研究:SaTC:核心:小型:检测和本地化机器学习库中的非功能性漏洞
- 批准号:
2230060 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
Collaborative Research: SaTC: CORE: Small: Detecting and Localizing Non-Functional Vulnerabilities in Machine Learning Libraries
协作研究:SaTC:核心:小型:检测和本地化机器学习库中的非功能性漏洞
- 批准号:
2230061 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
SaTC: CORE: Medium: After the Breach: Detecting Lateral Movement, Reconnaissance, and Exfiltration in Enterprise Networks
SaTC:核心:中:违规后:检测企业网络中的横向移动、侦察和渗透
- 批准号:
2152644 - 财政年份:2022
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant