Abstract
We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security. Previous work has shown that existing defenses are insufficient and poorly deployed, in part due to performance concerns. In this paper we explore the threat and its implications for system architecture. We propose a range of protection techniques, from lightweight to heavyweight, across different classes of systems. We consider how emerging capability architectures (and specifically the CHERI protection model) can enhance protection and provide a convenient bridge to describe interactions among software and hardware components. Finally, we describe how new schemes may be more efficient than existing defenses.
Cite
CITATION STYLE
Markettos, A. T., Baldwin, J., Bukin, R., Neumann, P. G., Moore, S. W., & Watson, R. N. M. (2020). Position Paper:Defending Direct Memory Access with CHERI Capabilities. In ACM International Conference Proceeding Series. Association for Computing Machinery. https://doi.org/10.1145/3458903.3458910
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.