Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/PRDC.2009.30guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Low-Overhead Architecture for Security Tag

Published: 16 November 2009 Publication History

Abstract

A security-tagged architecture is one that applies tags on data to detect attack or information leakage, tracking data flow.The previous studies using security-tagged architecture mostly focused on how to utilize tags, not how the tags are implemented. A naive implementation of tags simply adds a tag field to every byte of the cache and the memory. Such technique, however, results in a huge hardware overhead.This paper proposes a low-overhead tagged architecture. We achieve our goal by exploiting some properties of tag, the non-uniformity and the locality of reference. Our design includes a use of uniquely designed multi-level table and various cache-like structures, all contributing to exploit these properties. Under simulation, our method was able to limit the memory overhead to 1.8%, where a naive implementation suffered 12.5% overhead.

Cited By

View all
  • (2021)Hardware Information Flow TrackingACM Computing Surveys10.1145/344786754:4(1-39)Online publication date: 3-May-2021
  • (2015)Architectural Support for Software-Defined Metadata ProcessingACM SIGARCH Computer Architecture News10.1145/2786763.269438343:1(487-502)Online publication date: 14-Mar-2015
  • (2015)Architectural Support for Software-Defined Metadata ProcessingACM SIGPLAN Notices10.1145/2775054.269438350:4(487-502)Online publication date: 14-Mar-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
PRDC '09: Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing
November 2009
343 pages
ISBN:9780769538495

Publisher

IEEE Computer Society

United States

Publication History

Published: 16 November 2009

Author Tags

  1. DIFT
  2. Dependable Architecture
  3. Information security
  4. Multi-level table
  5. Tagged Architecture

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Hardware Information Flow TrackingACM Computing Surveys10.1145/344786754:4(1-39)Online publication date: 3-May-2021
  • (2015)Architectural Support for Software-Defined Metadata ProcessingACM SIGARCH Computer Architecture News10.1145/2786763.269438343:1(487-502)Online publication date: 14-Mar-2015
  • (2015)Architectural Support for Software-Defined Metadata ProcessingACM SIGPLAN Notices10.1145/2775054.269438350:4(487-502)Online publication date: 14-Mar-2015
  • (2015)Architectural Support for Software-Defined Metadata ProcessingProceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/2694344.2694383(487-502)Online publication date: 14-Mar-2015

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media