Applying the Flask Security Architecture to Secure SoC Design
暂无分享,去创建一个
We explore a reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and authenticity of every access to every system object. Access decisions are administered by a security logic server implemented as an extension of the peripheral bus. Initial results show a minimal increase in resource overhead and no significant impact on the performance.
[1] Christophe Bobda,et al. Hardware/Software Isolation and Protection Architecture for Transparent Security Enforcement in Networked Devices , 2016, 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[2] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[3] Ryan Kastner,et al. Designing secure systems on reconfigurable hardware , 2008, TODE.