An Analysis of the Intel 80x86 Security Architecture and Implementations

An in depth analysis of the 80/spl times/86 processor families identifies architectural properties that may have unexpected, and undesirable, results in secure computer systems. In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems. We discuss the imbalance in scrutiny for hardware protection mechanisms relative to software, and why this imbalance is increasingly difficult to justify as hardware complexity increases. We illustrate this difficulty with examples of architectural subtleties and reported implementation errors.

[1]  Hilarie Orman,et al.  Reverification of a microprocessor , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[2]  P. J. Windley,et al.  A hierarchical methodology for verifying microprogrammed microprocessors , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Jeffrey J. Joyce,et al.  Formal Verification and Implementation of a Microprocessor , 1988 .

[4]  Wei-Ming Hu,et al.  Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Leo Marcus,et al.  Using the State Delta Verification System (SDVS) for Hardware Verification , 1992, TPCD.

[6]  Joshua D. Guttman,et al.  Verifying a hardware security architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[7]  W.J. Cullyer Implementing high integrity systems: the VIPER microprocessor , 1989, IEEE Aerospace and Electronic Systems Magazine.

[8]  Robert Lindell,et al.  The Intel 80/spl times/86 processor architecture: pitfalls for secure systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[9]  James L. Turley Advanced 80386 Programming Techniques , 1988 .

[10]  R K Bauer,et al.  Security Concepts for Microprocessor Based Key Generator Controllers. , 1984 .

[11]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[12]  Carl E. Landwehr,et al.  A taxonomy of computer program security flaws , 1993, CSUR.

[13]  Jeff Jones,et al.  The Architecture of Triad: A Distributed, Real-Time, Trusted System , 1995 .

[14]  M. K. Srivas,et al.  Applying formal verification to a commercial microprocessor , 1995, Proceedings of ASP-DAC'95/CHDL'95/VLSI'95 with EDA Technofair.

[15]  John C. Wray An Analysis of Covert Timing Channels , 1992, J. Comput. Secur..

[16]  Carl E. Landwehr,et al.  A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .

[17]  Virgil D. Gligor Analysis of the Hardware Verification of the Honeywell SCOMP , 1985, 1985 IEEE Symposium on Security and Privacy.