IOSEC - Protection and Memory Safety for Input/Output Security
IOSEC - 输入/输出安全的保护和内存安全
基本信息
- 批准号:EP/R012458/1
- 负责人:
- 金额:$ 65.23万
- 依托单位:
- 依托单位国家:英国
- 项目类别:Research Grant
- 财政年份:2018
- 资助国家:英国
- 起止时间:2018 至 无数据
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
We wish to re-architect current computer input/output (I/O) systems with security as a first-class design constraint. Existing I/O has evolved organically over the decades and now faces a 'perfect storm' of security vulnerabilities, which we aim to address.Computers today are full of processors: advertised, hidden and even unintentional. Processors, in the form of embedded microcontrollers, are hidden in 'devices' that we name as 'wireless card' or 'system management controller', but fundamentally they form a heterogenous distributed system. The software these processors run is often poorly scrutinised and may be actively malicious. As this field becomes more visible, vulnerabilities are being discovered with increasing frequency.Worse still, the trend is for 'pluggable' devices via interfaces such as USB Type-C and Thunderbolt 3: users are being trained to pick up processors, thinking they are innocuous because theyare shaped like chargers or dongles. For instance, many buildings, aircraft, trains and buses now provide 'USB charging', but, without protection, the Type-C user may be exposing themselves to unexpected threats. Such threats are of substantial and increasing concern to businesses, government and consumers. By redesigning I/O with security at the core, we aim to considerably improve on today's weaknesses. We will investigate the weaknesses of current I/O and propose safer alternatives through three threads of research:1. We will begin by performing a survey of the state-of-the-art of access-control protections in current hardware and software designs, to understand the limits of current pluggable-device security. We will focus in particular on current utilisation of Input/Output Memory Management Units (IOMMUs), which are the primary current defence that prevents devices from having unlimited Direct Memory Access (DMA) - the 'key to the kingdom' of system security that otherwise permits total compromise of firmware, OS, and applications from malicious devices. We will characterise current security-performance tradeoffs to establish a performance baseline. We will systemise new vulnerability classes and develop a corpus of vector-specific attack techniques which future defences must prevent or mitigate.Our existing preliminary results investigating IOMMU use in modern operating systems, and a growing attack literature, suggest substantial security and performance shortcomings. We therefore propose two strands of research to develop and evaluate technical approaches to defend against I/O-based attackers:2. Many I/O devices (e.g., USB and network cards) communicate with the host operating system through messages sent and received via DMA. We will develop new techniques to restructure CPU-to-I/O interconnects to provide a message-based abstraction for untrustworthy devices, rather than depending on DMA, as is current (and highly vulnerable) best practice.3. To address devices for which a memory-oriented semantic is intrinsic (e.g., GPUs and Remote-DMA enabled network cards), we will explore new distributed-memory protection techniques that avoid the granularity and performance limitations of IOMMU-oriented approaches. This will enable greater control of device access to host memory while improving security-performance tradeoffs. For instance we might delegate specific memory access rights to devices, with policy and unforgeability enforced by the interconnect bridges.All research will be performed via hardware-software co-design methodology and FPGA prototyping, with evaluation relative to performance, complexity, compatibility, and security metrics for both hardware and software. We will pursue these goals in close collaboration with ARM Ltd, who provide key insights into industry requirements and a transition path into commercial technologies.
我们希望重新架构当前的计算机输入/输出(I/O)系统的安全性作为一个一流的设计约束。现有的I/O经过几十年的有机发展,现在面临着一场安全漏洞的“完美风暴”,我们的目标是解决这些问题。今天的计算机充满了处理器:广告,隐藏甚至无意的。处理器以嵌入式微控制器的形式隐藏在我们称为“无线卡”或“系统管理器”的“设备”中,但从根本上说,它们形成了一个异构的分布式系统。这些处理器运行的软件通常没有受到严格的审查,并且可能是恶意的。随着这一领域变得越来越明显,漏洞被发现的频率越来越高。更糟糕的是,通过USB Type-C和Thunderbolt 3等接口的“可插拔”设备的趋势:用户正在接受培训,以拿起处理器,认为它们是无害的,因为它们的形状像充电器或加密狗。例如,许多建筑物、飞机、火车和公共汽车现在都提供“USB充电”,但如果没有保护,Type-C用户可能会面临意想不到的威胁。这些威胁是企业、政府和消费者日益关注的重大问题。通过以安全性为核心重新设计I/O,我们的目标是大大改善当今的弱点。我们将通过三个研究线索来调查当前I/O的弱点,并提出更安全的替代方案:1。我们将开始通过执行当前硬件和软件设计中的访问控制保护的最新技术水平的调查,以了解当前可插拔设备安全性的限制。我们将特别关注输入/输出内存管理单元(IOMMU)的当前利用率,这是当前主要的防御措施,可以防止设备具有无限制的直接内存访问(DMA)-系统安全的“王国之钥”,否则会使固件,操作系统和应用程序受到恶意设备的全面危害。我们将描述当前安全性与性能的权衡,以建立性能基线。我们将系统化新的漏洞类别,并开发一个语料库的向量特定的攻击技术,未来的防御必须防止或减轻。我们现有的初步结果调查IOMMU在现代操作系统中的使用,以及越来越多的攻击文献,提出了大量的安全性和性能缺陷。因此,我们提出了两个研究方向来开发和评估防御基于I/O的攻击者的技术方法:2。许多I/O设备(例如,USB和网卡)通过经由DMA发送和接收的消息与主机操作系统通信。我们将开发新的技术来重构CPU到I/O的互连,为不可信的设备提供基于消息的抽象,而不是依赖于DMA,这是当前(也是非常脆弱的)最佳实践。要解决面向内存的语义是固有的设备(例如,GPU和支持远程DMA的网卡),我们将探索新的分布式内存保护技术,以避免面向IOMMU的方法的粒度和性能限制。这将实现对主机内存的设备访问的更好控制,同时改善安全性-性能权衡。例如,我们可以将特定的内存访问权限授予设备,并通过互连桥强制执行策略和不可伪造性。所有研究都将通过软硬件协同设计方法和FPGA原型来执行,并对硬件和软件的性能、复杂性、兼容性和安全性指标进行评估。我们将与ARM公司密切合作,共同实现这些目标,ARM公司提供了对行业需求的关键见解,并提供了向商业技术过渡的途径。
项目成果
期刊论文数量(7)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Cornucopia: Temporal Safety for CHERI Heaps
- DOI:10.1109/sp40000.2020.00098
- 发表时间:2020-05
- 期刊:
- 影响因子:0
- 作者:N. Filardo;B. F. Gutstein;Jonathan Woodruff;S. Ainsworth;Lucian Paul-Trifu;Brooks Davis;Hongyan Xia;E. Napierala;Alexander Richardson;John Baldwin;D. Chisnall;Jessica Clarke;Khilan Gudka;Alexandre Joannou;A. T. Markettos;Alfredo Mazzinghi;Robert M. Norton;M. Roe;Peter Sewell;Stacey D. Son;Timothy M. Jones;S. Moore;P. Neumann;R. Watson
- 通讯作者:N. Filardo;B. F. Gutstein;Jonathan Woodruff;S. Ainsworth;Lucian Paul-Trifu;Brooks Davis;Hongyan Xia;E. Napierala;Alexander Richardson;John Baldwin;D. Chisnall;Jessica Clarke;Khilan Gudka;Alexandre Joannou;A. T. Markettos;Alfredo Mazzinghi;Robert M. Norton;M. Roe;Peter Sewell;Stacey D. Son;Timothy M. Jones;S. Moore;P. Neumann;R. Watson
Through computer architecture, darkly
通过计算机体系结构,黑暗
- DOI:10.1145/3325284
- 发表时间:2019
- 期刊:
- 影响因子:22.7
- 作者:Markettos A
- 通讯作者:Markettos A
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals
Thunderclap:通过来自不可信外设的 DMA 探索操作系统 IOMMU 保护中的漏洞
- DOI:10.14722/ndss.2019.23194
- 发表时间:2019
- 期刊:
- 影响因子:0
- 作者:Markettos A
- 通讯作者:Markettos A
CHERI Concentrate: Practical Compressed Capabilities
CHERI Concentrate:实用的压缩功能
- DOI:10.1109/tc.2019.2914037
- 发表时间:2019
- 期刊:
- 影响因子:3.7
- 作者:Woodruff J
- 通讯作者:Woodruff J
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Robert Watson其他文献
Assessing and Managing Exposure from Arsenic in CCA-Treated Wood Play Structures
- DOI:
10.1007/bf03403987 - 发表时间:
2004-11-01 - 期刊:
- 影响因子:2.600
- 作者:
Franca Ursitti;Loren Vanderlinden;Robert Watson;Monica Campbell - 通讯作者:
Monica Campbell
Repair of left ventricular aneurysm with acellular dermis graft: A case report
- DOI:
10.1016/j.jccase.2012.04.006 - 发表时间:
2012-08-01 - 期刊:
- 影响因子:
- 作者:
Philip S. Lim;Nancy Bierowski;Mauricio Garrido;Robert Watson;Asoka Balaratna;V. Paul Addonizio - 通讯作者:
V. Paul Addonizio
Board Pay and the Separation of Ownership from Control in U.K. SMEs
英国中小企业董事会薪酬与所有权和控制权的分离
- DOI:
10.1007/s11187-005-6438-y - 发表时间:
2005-06-01 - 期刊:
- 影响因子:4.800
- 作者:
Robert Watson;Nick Wilson - 通讯作者:
Nick Wilson
Firm Growth and Supply Chain Partnerships: An Empirical Analysis of U.K. SME Subcontractors
- DOI:
10.1007/s11187-005-3095-0 - 发表时间:
2005-01-01 - 期刊:
- 影响因子:4.800
- 作者:
Pooran Wynarczyk;Robert Watson - 通讯作者:
Robert Watson
Bleeding Complications as Predictor for Mortality
出血并发症作为死亡率的预测因子
- DOI:
- 发表时间:
2008 - 期刊:
- 影响因子:9.8
- 作者:
Michael Kuehl;Matthew Lewis;Robert Watson - 通讯作者:
Robert Watson
Robert Watson的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Robert Watson', 18)}}的其他基金
CHERI for Hypervisors and Operating Systems (CHaOS)
用于虚拟机管理程序和操作系统 (CHaOS) 的 CHERI
- 批准号:
EP/V000292/1 - 财政年份:2020
- 资助金额:
$ 65.23万 - 项目类别:
Research Grant
FEMTO: FEmtosecond Measurement Technology Options
FEMTO:飞秒测量技术选项
- 批准号:
EP/M508251/1 - 财政年份:2015
- 资助金额:
$ 65.23万 - 项目类别:
Research Grant
SENTINEL: GNSS SErvices Needing Trust In Navigation, Electronics, Location & timing
SENTINEL:GNSS 服务需要对导航、电子设备、位置的信任
- 批准号:
TS/I00257X/1 - 财政年份:2011
- 资助金额:
$ 65.23万 - 项目类别:
Research Grant
The utilization of digital television and radio signals for atmospheric science
数字电视和无线电信号在大气科学中的利用
- 批准号:
NE/I000933/1 - 财政年份:2010
- 资助金额:
$ 65.23万 - 项目类别:
Research Grant
A study of the climatic dependency of rainfall rate dynamics for use in the design of fade mitigation techniques
降雨率动态的气候依赖性研究,用于设计褪色缓解技术
- 批准号:
EP/D057930/1 - 财政年份:2006
- 资助金额:
$ 65.23万 - 项目类别:
Research Grant
相似海外基金
(ICF)- IMMPROVE: Immune Memory and Mechanisms of Protection from Vaccines
(ICF)-IMMPROVE:免疫记忆和疫苗保护机制
- 批准号:
MR/Y004450/1 - 财政年份:2024
- 资助金额:
$ 65.23万 - 项目类别:
Research Grant
Developing a new bispecific antibody mimicking rapid antigen-specific memory CD8+ T cell-mediated protection
开发一种新型双特异性抗体,模仿快速抗原特异性记忆 CD8 T 细胞介导的保护
- 批准号:
10742118 - 财政年份:2023
- 资助金额:
$ 65.23万 - 项目类别:
Investigating the memory CD4 T cell compartments that emerge from intestinal infection: do location and plasticity determine immune protection?
研究肠道感染产生的记忆 CD4 T 细胞区室:位置和可塑性决定免疫保护吗?
- 批准号:
MR/X001407/1 - 财政年份:2023
- 资助金额:
$ 65.23万 - 项目类别:
Research Grant
Memory-promoting Ad vaccine for long-lived protection against SARS-CoV-2
促进记忆的 Ad 疫苗可针对 SARS-CoV-2 提供长期保护
- 批准号:
10158147 - 财政年份:2021
- 资助金额:
$ 65.23万 - 项目类别:
CRII: SHF: Pointer-aware Memory: Boosting Cybersecurity by Making Strong Memory Protection Affordable for Irregular Applications
CRII:SHF:指针感知内存:通过为不规则应用程序提供强大的内存保护来增强网络安全
- 批准号:
1850025 - 财政年份:2019
- 资助金额:
$ 65.23万 - 项目类别:
Standard Grant
Memory T cell protection of reproductive health following influenza infection
流感感染后记忆 T 细胞对生殖健康的保护
- 批准号:
9754229 - 财政年份:2018
- 资助金额:
$ 65.23万 - 项目类别:
Mechanisms of memory CD4 T cell-mediated immune protection against Chlamydia
记忆 CD4 T 细胞介导的衣原体免疫保护机制
- 批准号:
9906841 - 财政年份:2018
- 资助金额:
$ 65.23万 - 项目类别:
Memory T cell protection of reproductive health following influenza infection
流感感染后记忆 T 细胞对生殖健康的保护
- 批准号:
9590193 - 财政年份:2018
- 资助金额:
$ 65.23万 - 项目类别:
Mechanisms of memory CD4 T cell-mediated immune protection against Chlamydia
记忆 CD4 T 细胞介导的衣原体免疫保护机制
- 批准号:
10392886 - 财政年份:2018
- 资助金额:
$ 65.23万 - 项目类别:
Memory protection for system software isolation
系统软件隔离的内存保护
- 批准号:
2105211 - 财政年份:2018
- 资助金额:
$ 65.23万 - 项目类别:
Studentship