On the architecture of secure software defined radios

This paper examines the rationale, properties and shortcomings of the prevailing ldquored-blackrdquo architecture for secure software defined radios (SDR). To address shortcomings, a computer security process is formalized that leads to a provably secure SDR architectural framework. Although an example of a secure architecture is discussed, the focus is to explore an architectural design strategy to achieve guaranteed secure operation. The result is more of an architectural framework with remarkable potential relative to previous approaches, including enabling deterministic development, operational friendliness, high performance, and affordability through strategic use of hardware to strengthen and simplify the enforcement of the security policy instead of simply trusting software.

[1]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[2]  David Elliott Bell,et al.  Looking back at the Bell-La Padula model , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[3]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[4]  Martin R. Stytz Considering defense in depth for software applications , 2004, IEEE Security & Privacy Magazine.

[5]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[6]  M. Kurdziel,et al.  An SCA security supplement compliant radio architecture , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[7]  John A. Davidson Asymmetric isolation , 1996, Proceedings 12th Annual Computer Security Applications Conference.

[8]  C. Weissman BLACKER: security for the DDN examples of A1 security engineering trades , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  James A. Whittaker Why Secure Applications are Difficult to Write , 2003, IEEE Secur. Priv..

[11]  K. J. Bma Integrity considerations for secure computer systems , 1977 .