CRII: SaTC: Detecting Security Vulnerabilities in Instruction Set Architectures

CRII:SaTC:检测指令集架构中的安全漏洞

基本信息

项目摘要

The interaction between computer processors -- the hardware at the heart of our computers, tablets, and phones -- and software -- apps, web browsers, and other applications -- is governed by an Instruction Set Architecture (ISA). The ISA is the specification that defines how the processor will respond to commands from the software. It is large and complex, too large for a person to understand and reason about all the interactions between different parts completely. As a result, security vulnerabilities exist in the ISA. These vulnerabilities can sometimes be exploited by attackers to steal data or take control of the machine. This research is about detecting security vulnerabilities that exist in the ISA. Finding and removing these vulnerabilities will create a more secure foundation for all our computing activities. This will benefit government agencies that require high assurance environments, cloud providers that rely on hardware features for the security for their service, and users who, more and more, are relying on diverse hardware components from a variety of hardware design companies to handle their private and sensitive data.The researchers posit that vulnerabilities in the ISA happen in one of two ways: 1) Erroneous specification: the ISA prescribes behavior that is dangerous; or 2) Nondeterminism in the specification: the ISA is incomplete and one of the possible behaviors allowed by the specification is dangerous. The hypothesis of this research is that it is possible to focus on a relatively small subset of the ISA for which these types of errors are likely to occur. The researchers are developing a practical methodology for discovering for which instructions vulnerabilities are most likely to occur. With that information, they are developing tools to detect and correct security-critical errors in the ISA. In addition to making a practical contribution, the research activities are improving understanding in the computer science community of what a vulnerability in an ISA looks like and where and under what conditions it is likely to occur. This will enable future verification efforts to concentrate on the most security-critical aspects of the ISA.
计算机处理器(我们的计算机,平板电脑和手机的核心硬件)与软件(应用程序,Web浏览器和其他应用程序)之间的交互由指令集架构(伊萨)管理。伊萨是定义处理器如何响应软件命令的规范。它庞大而复杂,对于一个人来说太大了,无法完全理解和推理不同部分之间的所有互动。因此,伊萨中存在安全漏洞。这些漏洞有时会被攻击者利用来窃取数据或控制机器。本研究是关于检测伊萨中存在的安全漏洞。找到并消除这些漏洞将为我们所有的计算活动创造一个更安全的基础。这将有利于需要高保证环境的政府机构,依赖硬件功能来确保其服务安全的云提供商,以及越来越多地依赖各种硬件设计公司的各种硬件组件来处理其私人和敏感数据的用户。研究人员认为伊萨中的漏洞以两种方式之一发生:1)错误的规范:伊萨规定了危险的行为; 2)规范中的不确定性:伊萨是不完整的,规范允许的可能行为之一是危险的。 本研究的假设是,有可能集中在伊萨的一个相对较小的子集,这些类型的错误可能会发生。 研究人员正在开发一种实用的方法来发现哪些指令漏洞最有可能发生。有了这些信息,他们正在开发工具来检测和纠正伊萨中的安全关键错误。 除了作出实际贡献外,研究活动还使计算机科学界更好地了解伊萨中的漏洞是什么样的,以及它可能在哪里和在什么条件下发生。这将使今后的核查工作能够集中于《伊萨》最关键的安全方面。

项目成果

期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ monograph.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ sciAawards.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ conferencePapers.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ patent.updateTime }}

Cynthia Sturton其他文献

Cynthia Sturton的其他文献

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

{{ truncateString('Cynthia Sturton', 18)}}的其他基金

Collaborative Research: SaTC: CORE: Medium: Hardware Security Insights: Analyzing Hardware Designs to Understand and Assess Security Weaknesses and Vulnerabilities
协作研究:SaTC:核心:中:硬件安全见解:分析硬件设计以了解和评估安全弱点和漏洞
  • 批准号:
    2247754
  • 财政年份:
    2023
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Continuing Grant
SaTC: STARSS: Small: Tackling the Corner Cases: Finding Security Vulnerabilities in CPU Designs
SaTC:STARSS:小型:解决极端情况:查找 CPU 设计中的安全漏洞
  • 批准号:
    1816637
  • 财政年份:
    2018
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
CPS: Frontier: Collaborative Research: VeHICaL: Verified Human Interfaces, Control, and Learning for Semi-Autonomous Systems
CPS:前沿:协作研究:VeHCaL:半自主系统的经过验证的人机界面、控制和学习
  • 批准号:
    1544924
  • 财政年份:
    2016
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Continuing Grant
EAGER: Identifying Security Critical Properties of a Processor
EAGER:识别处理器的安全关键属性
  • 批准号:
    1651276
  • 财政年份:
    2016
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant

相似海外基金

Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
  • 批准号:
    2338301
  • 财政年份:
    2024
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
  • 批准号:
    2338302
  • 财政年份:
    2024
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Small: Detecting and Localizing Non-Functional Vulnerabilities in Machine Learning Libraries
协作研究:SaTC:核心:小型:检测和本地化机器学习库中的非功能性漏洞
  • 批准号:
    2230060
  • 财政年份:
    2023
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
Collaborative Research: SaTC: CORE: Small: Detecting and Localizing Non-Functional Vulnerabilities in Machine Learning Libraries
协作研究:SaTC:核心:小型:检测和本地化机器学习库中的非功能性漏洞
  • 批准号:
    2230061
  • 财政年份:
    2023
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
SaTC: CORE: Medium: After the Breach: Detecting Lateral Movement, Reconnaissance, and Exfiltration in Enterprise Networks
SaTC:核心:中:违规后:检测企业网络中的横向移动、侦察和渗透
  • 批准号:
    2152644
  • 财政年份:
    2022
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
CRII: SaTC: Towards Detecting and Mitigating Vulnerabilities
CRII:SaTC:致力于检测和缓解漏洞
  • 批准号:
    2153474
  • 财政年份:
    2022
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
Collaborative Research: SaTC: TTP: Small: eSLIC: Enhanced Security Static Analysis for Detecting Insecure Configuration Scripts
协作研究:SaTC:TTP:小型:eSLIC:用于检测不安全配置脚本的增强安全静态分析
  • 批准号:
    2247141
  • 财政年份:
    2022
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
Collaborative Research: SaTC: CORE: Small: Flanker: Automatically Detecting Lateral Movement in Organizations Using Heterogeneous Data and Graph Representation Learning
协作研究:SaTC:核心:小型:侧翼:使用异构数据和图表示学习自动检测组织中的横向运动
  • 批准号:
    2127232
  • 财政年份:
    2021
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
Collaborative Research: SaTC: CORE: Small: Detecting Accounts Involved in Influence Campaigns on Social Media
协作研究:SaTC:核心:小型:检测参与社交媒体影响力活动的帐户
  • 批准号:
    2114411
  • 财政年份:
    2021
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
Collaborative Research: SaTC: CORE: Small: Flanker: Automatically Detecting Lateral Movement in Organizations Using Heterogeneous Data and Graph Representation Learning
协作研究:SaTC:核心:小型:侧翼:使用异构数据和图表示学习自动检测组织中的横向运动
  • 批准号:
    2127200
  • 财政年份:
    2021
  • 资助金额:
    $ 17.5万
  • 项目类别:
    Standard Grant
{{ showInfoDetail.title }}

作者:{{ showInfoDetail.author }}

知道了