Position Paper:Defending Direct Memory Access with CHERI Capabilities

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security. Previous work has shown that existing defenses are insufficient and poorly deployed, in part due to performance concerns. In this paper we explore the threat and its implications for system architecture. We propose a range of protection techniques, from lightweight to heavyweight, across different classes of systems. We consider how emerging capability architectures (and specifically the CHERI protection model) can enhance protection and provide a convenient bridge to describe interactions among software and hardware components. Finally, we describe how new schemes may be more efficient than existing defenses.

Cite

CITATION STYLE

APA

Markettos, A. T., Baldwin, J., Bukin, R., Neumann, P. G., Moore, S. W., & Watson, R. N. M. (2020). Position Paper:Defending Direct Memory Access with CHERI Capabilities. In ACM International Conference Proceeding Series. Association for Computing Machinery. https://doi.org/10.1145/3458903.3458910

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free