SaTC: CORE: Small: A Secure Processor that Exploits Multicore Parallelism while Protecting Against Microarchitecture State Attacks
SaTC:CORE:小型:利用多核并行性同时防止微架构状态攻击的安全处理器
基本信息
- 批准号:1929261
- 负责人:
- 金额:$ 50万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2019
- 资助国家:美国
- 起止时间:2019-10-01 至 2024-09-30
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Microprocessors are widely deployed in cloud, fog, edge, and mobile computing platforms. In all cases, the economies of scale stem from our ability (through the use of mature virtualization technologies) to host large sets of applications from diverse domains. These applications increasingly operate on private or confidential user data. A major hurdle for exposing and exploiting virtualization capabilities in next generation processors is the lack of a clear vision for how to address the security challenges associated with co-locating applications that share hardware. This project singles out the challenge of controlling leakage of speculative and non-speculative microarchitecture state information: the ability of an adversary to glean sensitive information about a co-located workload by observing patterns of communication or resource utilization at various layers of the processor hardware stack. The importance of this problem is exacerbated by recent attacks on commercial microprocessors, where hardware resource sharing is exploited to expose microarchitecture state information to an adversary that is otherwise inaccessible or not directly visible in the system state.The project develops a new abstraction for securing the microarchitecture state vulnerabilities in multicore processors. Today's processors assume temporal execution of secure (victim) and insecure (potentially malicious) applications under the purview of virtualization. For strong isolation, at each context switch, a secure processor must clean the microarchitecture state from all shared hardware resources. This project re-thinks secure processor designs, and challenges these assumptions in the context of multicore processors. A spatio-temporal execution model is envisioned, where the cores are spatially partitioned into secure and insecure clusters (or domains). The secure cluster and its accompanying software and hardware is envisioned to become the only trusted component in the multicore processor trusted computing base (TCB). This allows the concurrently executing domains to fully exploit their allocated hardware resources for performance, while guaranteeing bounded information leakage through the hardware sharing of microarchitecture state. The incorporation of security to tackle microarchitecture state vulnerabilities at various levels of the processor hardware is timely, as it ensures that the consideration of security concerns in the still-evolving hardware stack is not an afterthought. Doing so will speed up the adoption of emerging safety-critical secure applications, thus improving the hardness and certification of the US cyber infrastructure, with significant benefits to our economy and society.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
微处理器广泛部署在云,雾,边缘和移动计算平台中。在所有情况下,规模经济都源于我们的能力(通过使用成熟的虚拟化技术)托管来自不同领域的大量应用程序。这些应用程序越来越多地在私人或机密用户数据上运行。在下一代处理器中揭示和利用虚拟化功能的一个主要障碍是缺乏明确的愿景,即如何应对与共享硬件的共同确定应用程序相关的安全挑战。该项目解决了控制投机性和非规范微体系结构状态信息的泄漏的挑战:对手通过观察处理器硬件堆栈各个层的通信或资源利用模式通过观察通信或资源利用模式来收集有关共同工作量的敏感信息的能力。最近对商业微处理器的攻击使此问题的重要性加剧了,在这些攻击中,硬件资源共享被利用,以将微体系结构状态信息暴露于对手中,否则该项目在系统状态下是无法访问或不直接可见的。该项目在多核心处理器中开发了一种新的抽象,以确保一种新的抽象。当今的处理器假设在虚拟化的权限下对安全(受害者)和不安全(潜在恶意)应用程序进行时间执行。对于强隔离,在每个上下文开关处,安全处理器必须从所有共享硬件资源中清洁微结构状态。该项目重新考虑了安全的处理器设计,并在多层处理器的背景下挑战了这些假设。设想了一个时空执行模型,其中将核心划分为安全和不安全的群集(或域)。设想安全集群及其随附的软件和硬件成为多核心处理器受信任计算基础(TCB)中唯一受信任的组件。这使得同时执行域可以充分利用其分配的硬件资源来进行性能,同时通过微体系结构状态的硬件共享来确保有限的信息泄漏。在处理器硬件的各个级别上解决安全状态漏洞的安全性是及时的,因为它可以确保在仍在不断发展的硬件堆栈中考虑安全问题并不是事后的想法。这样做将加快采用新兴安全至关重要的安全应用程序,从而改善美国网络基础设施的硬度和认证,并对我们的经济和社会产生重大好处。该奖项反映了NSF的法定任务,并被认为是值得通过基金会的知识绩效和更广泛影响的审查审查的评估来通过评估来获得支持的。
项目成果
期刊论文数量(13)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Timing-based side-channel attack and mitigation on PCIe connected distributed embedded systems
- DOI:10.1109/hpec49654.2021.9622848
- 发表时间:2021-01-01
- 期刊:
- 影响因子:0
- 作者:Khaliq, Salman Abdul;Ali, Usman;Khan, Omer
- 通讯作者:Khan, Omer
MultiCon: An Efficient Timing-based Side Channel Attack on Shared Memory Multicores
MultiCon:对共享内存多核的有效的基于定时的侧通道攻击
- DOI:10.1109/iccd56317.2022.00024
- 发表时间:2022
- 期刊:
- 影响因子:0
- 作者:Ali, Usman;Khan, Omer
- 通讯作者:Khan, Omer
ASM: An Adaptive Secure Multicore for Co-located Mutually Distrusting Processes
ASM:用于共置互不信任进程的自适应安全多核
- DOI:10.1145/3587480
- 发表时间:2023
- 期刊:
- 影响因子:1.6
- 作者:Sahni, Abdul Rasheed;Omar, Hamza;Ali, Usman;Khan, Omer
- 通讯作者:Khan, Omer
SSE: Security Service Engines to Accelerate Enclave Performance in Secure Multicore Processors
SSE:安全服务引擎可提高安全多核处理器中的 Enclave 性能
- DOI:10.1109/lca.2022.3210149
- 发表时间:2022
- 期刊:
- 影响因子:2.3
- 作者:Nye, Jared;Khan, Omer
- 通讯作者:Khan, Omer
IRONHIDE: A Secure Multicore that Efficiently Mitigates Microarchitecture State Attacks for Interactive Applications
IRONHIDE:一种安全多核,可有效缓解交互式应用程序的微架构状态攻击
- DOI:10.1109/hpca47549.2020.00019
- 发表时间:2020
- 期刊:
- 影响因子:0
- 作者:Omar, Hamza;Khan, Omer
- 通讯作者:Khan, Omer
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Omer Khan其他文献
Phosphodiesterase 5 Inhibitors and the Risk of Nephropathy and Long-Term Outcomes After Coronary Angiography and Percutaneous Coronary Intervention
- DOI:
10.1016/j.carrev.2022.06.176 - 发表时间:
2022-07-01 - 期刊:
- 影响因子:
- 作者:
Sumon Roy;Annette Min;Omer Khan;Robert Perera;Ion S. Jovin - 通讯作者:
Ion S. Jovin
The efficacy, safety and ethics of the use of testosterone-suppressing agents in the management of sex offending
使用睾酮抑制剂治疗性犯罪的有效性、安全性和伦理学
- DOI:
- 发表时间:
2016 - 期刊:
- 影响因子:0
- 作者:
Omer Khan;A. Mashru - 通讯作者:
A. Mashru
Personality disorder traits and self-reported target problems in a treatment-seeking sample.
寻求治疗样本中的人格障碍特征和自我报告的目标问题。
- DOI:
10.1002/cpp.1825 - 发表时间:
2014 - 期刊:
- 影响因子:3.6
- 作者:
N. Huband;C. Evans;C. Duggan;Omer Khan - 通讯作者:
Omer Khan
PATTERN OF CERVICAL RADICULOPATHY AS DIAGNOSED BY ELECTRODIAGNOSTIC STUDIES
通过电诊断研究诊断的颈椎神经根病的模式
- DOI:
- 发表时间:
2014 - 期刊:
- 影响因子:0
- 作者:
Omer Khan;A. Waheed;L. Ali - 通讯作者:
L. Ali
MaxK-GNN: Towards Theoretical Speed Limits for Accelerating Graph Neural Networks Training
MaxK-GNN:加速图神经网络训练的理论速度极限
- DOI:
- 发表时间:
2023 - 期刊:
- 影响因子:0
- 作者:
Hongwu Peng;Xi Xie;Kaustubh Shivdikar;Md Amit Hasan;Jiahui Zhao;Shaoyi Huang;Omer Khan;David Kaeli;Caiwen Ding - 通讯作者:
Caiwen Ding
Omer Khan的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Omer Khan', 18)}}的其他基金
Travel: NSF Student Travel Grant for the 2022 IEEE International Conference on Computer Design (ICCD)
旅行:2022 年 IEEE 国际计算机设计会议 (ICCD) 的 NSF 学生旅行补助金
- 批准号:
2232589 - 财政年份:2022
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
REU Site: Trustable Embedded Systems Security Research
REU 网站:可信嵌入式系统安全研究
- 批准号:
1950600 - 财政年份:2020
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
NSF Student Travel Grant for the 2018 IEEE International Conference on Computer Design (ICCD)
2018 年 IEEE 国际计算机设计会议 (ICCD) 的 NSF 学生旅费补助
- 批准号:
1838961 - 财政年份:2018
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
Student Travel Support for the 2017 International Conference on Computer Design (ICCD); Boston, MA; November 5-8, 2017
2017 年国际计算机设计会议 (ICCD) 学生旅行支持;
- 批准号:
1708257 - 财政年份:2017
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
CSR: Small: Efficient Many-core Execution Models for Cognitive Computing
CSR:小型:用于认知计算的高效多核执行模型
- 批准号:
1718481 - 财政年份:2017
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
EAGER: HAWKEYE: A Cross-Layer Resilient Architecture to Tradeoff Program Accuracy and Resilience Overheads
EAGER:HAWKEYE:一种跨层弹性架构,可权衡程序准确性和弹性开销
- 批准号:
1550470 - 财政年份:2015
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
EAGER: Locality-Aware Data Access Control for Future 1000-core Processors
EAGER:面向未来 1000 核处理器的位置感知数据访问控制
- 批准号:
1452327 - 财政年份:2014
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
相似国自然基金
基于NRF2调控KPNB1促进PD-L1核转位介导非小细胞肺癌免疫治疗耐药的机制研究
- 批准号:82303969
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
小胶质细胞调控外侧隔核-腹侧被盖区神经环路介导社交奖赏障碍的机制研究
- 批准号:82304474
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
肾去交感神经术促进下丘脑室旁核小胶质细胞M2型极化减轻心衰损伤的机制研究
- 批准号:82370387
- 批准年份:2023
- 资助金额:49 万元
- 项目类别:面上项目
空间邻近标记技术研究莱茵衣藻蛋白核小管与碳浓缩机制的潜在关系
- 批准号:32300220
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
polyG蛋白聚集体诱导小胶质细胞活化在神经元核内包涵体病中的作用及机制研究
- 批准号:82301603
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
相似海外基金
SaTC: CORE: Small: An evaluation framework and methodology to streamline Hardware Performance Counters as the next-generation malware detection system
SaTC:核心:小型:简化硬件性能计数器作为下一代恶意软件检测系统的评估框架和方法
- 批准号:
2327427 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338301 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Continuing Grant
SaTC: CORE: Small: NSF-DST: Understanding Network Structure and Communication for Supporting Information Authenticity
SaTC:核心:小型:NSF-DST:了解支持信息真实性的网络结构和通信
- 批准号:
2343387 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Standard Grant
NSF-NSERC: SaTC: CORE: Small: Managing Risks of AI-generated Code in the Software Supply Chain
NSF-NSERC:SaTC:核心:小型:管理软件供应链中人工智能生成代码的风险
- 批准号:
2341206 - 财政年份:2024
- 资助金额:
$ 50万 - 项目类别:
Standard Grant