Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3240765.3240769guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Vulnerability-Tolerant Secure Architectures

Published: 05 November 2018 Publication History

Abstract

Today, secure systems are built by identifying potential vulnerabilities and then adding protections to thwart the associated attacks. Unfortunately, the complexity of today's systems makes it impossible to prove that all attacks are stopped, so clever attackers find a way around even the most carefully designed protections. In this article, we take a sobering look at the state of secure system design, and ask ourselves why the “security arms race” never ends? The answer lies in our inability to develop adequate security verification technologies. We then examine an advanced defensive system in nature – the human immune system – and we discover that it does not remove vulnerabilities, rather it adds offensive measures to protect the body when its vulnerabilities are penetrated We close the article with brief speculation on how the human immune system could inspire more capable secure system designs.

References

[1]
C. Hawblitzel, J. Howell, M. Kapritsos, J. Lorch, B. Parno, M.L. Roberts, S. Setty, and B. Zill, “Ironfleet: Proving practical distributed systems correct:” in SOSP'15, October 2015.
[2]
B. Bond, C Hawblitzel, M. Kapritsos, K.R.M. Leino, J.R. Lorch, B. Parno, A. Rane, S. Setty, and L. Thompson, “Vale: Verifying highperformance cryptographic assembly code,” in USENIX Sec'17, 2017.
[3]
T. Ball and S.K. Rajamani, “The SLAM project Debugging system software via static analysis,” SIGPLAN Not., vol 37, Jan. 2002.
[4]
P. Deligiannis, A.F. Donaldson, and Z. Rakamaric, “Fast and precise symbolic analysis of concurrency bugs in device drivers,” in 30th IEEE/ACM In't Con/. on Automated Software Engineering, 2015.
[5]
J. Hansson, S. Helton, and P. Feiler, “ROI analysis of the system architecture virtual integration initiative,” Tech. Rep., Carnegie Mellon University, 2018.
[6]
R. Saracco, “Guess what requires 150 million lines of code.i.,” IEEE Future Directions Tech Blog, 2016. http://sites.ieee.org/futuredirections/2016/01/13/guess-what-requires-Ion-million-lines-of-code/
[7]
Y.S. Shao, B. Reagen, G. Wei, and D. Brooks, “The Aladdin approach to accelerator design and modeling,” IEEE Micro, vol. 35, May 2015.
[8]
B. Bentley, “Validating a modern microprocessor,” Computer Aided Verification, 2005.
[9]
S. Tasiran and K. Keutzer, “Coverage metries for functional validation of hardware designs,” IEEE Design and Test, vol. 18, July 2001.
[10]
I. Wagner and V. Bertacco, “Engineering trust with semantic guardians,” in 2007 Design, Automation Test in Europe, April 2007.
[11]
E. Schnarr and J.R. Larus, “Fast out-of-order processor simulation using memoization,” in Int'l Conf. on Architectural Support for Pro-Rramming Languages and Operating Systems, ASPLOS VIII. 1998.
[12]
W. Arthur, B. Mammo, R. Rodriguez, T. Austin, and V. Bertacco, “Schnauzer: Scalable profiling for likely security bug sites,” in Int'l Symp. on Code Generation and Optimization (CGO), Feb 2013.
[13]
P. Godefroid, M.Y. Levin, and D. Molnar, “SAGE: Whitebox fuzzing for security testing,” Queue, vol. 10, pp. 20:20–20:27, Jan. 2012.
[14]
M. Fenton, “Restoring executive confidence: Red teamoperations,” Network Security, Nov 2005.
[15]
Secure and trustworthy cyberspace (SaTC).” https://www.nsf.gov/funding/pgm_summ.jsp?pims_id=504709
[16]
H. Hata, M. Guo, and M.A. Babar, “Understanding the heterogeneity of contributors in bug bounty programs,” in Int'l Symp. on Empirical Software Engineering and Measurement, ESEM '17, 2017.
[17]
[18]
Expanding Intel's bug bounty program: New side channel program., increased awards,” https://newsroom.intel.com/news/expanding-intels-bug-bounty-program/, Feb. 2018.
[20]
S. Jajodia, A.K. Ghosh, V. Swamp, C. Wang, and X.S. Wang, Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Springer Publishing, 2011.
[22]
PaX Team, “PaX address space layout randomization (ASLR).” http://pax.grsecurity.net/docs/aslr.txt, 2003.
[23]
B. Gras, K. Razavi, E. Bosman, H. Bos, and C. Giuffrida, “ASLR on the Line: Practical Cache Attacks on the MMU,” in NDSS, Feb. 2017.
[24]
H. Sbacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh, “On the Effectiveness of Address-space Randomization,” in Conf. on Computer and Communications Security, CCS '04, 2004.
[25]
A. Bittau, A. Belay, A. Mashtizadeh, D. Mazièress, and D. Boneh; “Hacking Blind,” in IEEE Symp. on Security and Privacy, SP'14, 2014.
[26]
R. Gawlik, B. Kollenda, P. Koppe, B. Garmany, and T. Holz, “Enabling client-side crash-resistance to overcome diversification and information biding,” in NDSS, 2016.
[27]
E. Bosman, K. Razavi, H. Bos, and C. Giuffrida, “Dedup est machina: Memory deduplication as an advanced exploitation vector,” in IEEE Symp. on Security and Privacy (SP), May 2016.
[28]
D. Evtyushkin, D. Ponomarev, and N. Abo-Ghazaleh, “Jump over ASLR: Attacking branch predictors to bypass ASLR,” in Int'l Symp. on Microarchitecture (MICRO), Oct 2016.

Cited By

View all
  • (2025)LSTM-Characterized Approach for Chip Floorplanning: Leveraging HyperGCN and DRQNIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.343601344:2(709-722)Online publication date: Feb-2025
  • (2024)Transformer-Characterized Approach for Chip Floorplanning: Leveraging HyperGCN and DTQN2024 IEEE 42nd International Conference on Computer Design (ICCD)10.1109/ICCD63220.2024.00030(134-143)Online publication date: 18-Nov-2024
  • (2023)Progress of Placement Optimization for Accelerating VLSI Physical DesignElectronics10.3390/electronics1202033712:2(337)Online publication date: 9-Jan-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
Nov 2018
939 pages

Publisher

IEEE Press

Publication History

Published: 05 November 2018

Permissions

Request permissions for this article.

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)LSTM-Characterized Approach for Chip Floorplanning: Leveraging HyperGCN and DRQNIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.343601344:2(709-722)Online publication date: Feb-2025
  • (2024)Transformer-Characterized Approach for Chip Floorplanning: Leveraging HyperGCN and DTQN2024 IEEE 42nd International Conference on Computer Design (ICCD)10.1109/ICCD63220.2024.00030(134-143)Online publication date: 18-Nov-2024
  • (2023)Progress of Placement Optimization for Accelerating VLSI Physical DesignElectronics10.3390/electronics1202033712:2(337)Online publication date: 9-Jan-2023
  • (2023)TOFU: A Two-Step Floorplan Refinement Framework for Whitespace Reduction2023 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE56975.2023.10137175(1-5)Online publication date: Apr-2023
  • (2023)PeF: Poisson’s Equation-Based Large-Scale Fixed-Outline FloorplanningIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.321360942:6(2002-2015)Online publication date: Jun-2023
  • (2023)Thermal-Aware SoC Macro Placement and Multi-chip Module Design Optimization with Bayesian Optimization2023 IEEE 73rd Electronic Components and Technology Conference (ECTC)10.1109/ECTC51909.2023.00160(935-942)Online publication date: May-2023
  • (2023)Fast power density aware three‐dimensional integrated circuit floorplanning for hard macroblocks using best operator combination genetic algorithmInternational Journal of Circuit Theory and Applications10.1002/cta.367251:10(4879-4896)Online publication date: 29-May-2023
  • (2022)Generalizable Floorplanner through Corner Block List Representation and Hypergraph EmbeddingProceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3534678.3539220(2692-2702)Online publication date: 14-Aug-2022
  • (2021)Thermal-Aware Fixed-Outline Floorplanning Using Analytical Models With Thermal-Force ModulationIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2021.306266929:5(985-997)Online publication date: May-2021
  • (2020)Thermal driven Floorplanning for Fixed Outline LayoutsJournal of Circuits, Systems and Computers10.1142/S0218126621500791Online publication date: 17-Jul-2020
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media