Compilers: principles, techniques, and tools
Compilers: principles, techniques, and tools
Grail: a C++ library for automata and expressions
Journal of Symbolic Computation - Special issue on “algorithms: implementation, libraries and use”
Custom computing machines: an introduction
The Journal of Supercomputing - Special issue on field programmable gate arrays
Programmable active memories: reconfigurable systems come of age
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Reconfigurable computing: what, why, and implications for design automation
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
SASI enforcement of security policies: a retrospective
Proceedings of the 1999 workshop on New security paradigms
ACM Transactions on Information and System Security (TISSEC)
Protection and the control of information sharing in multics
Communications of the ACM
A quick safari through the reconfiguration jungle
Proceedings of the 38th annual Design Automation Conference
Cost profile of a highly assured, secure operating system
ACM Transactions on Information and System Security (TISSEC)
Reconfigurable computing: a survey of systems and software
ACM Computing Surveys (CSUR)
An Introduction to Formal Languages and Automata
An Introduction to Formal Languages and Automata
Synthesis and Optimization of Digital Circuits
Synthesis and Optimization of Digital Circuits
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
Design and verification of secure systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
MLS-PCA: A High Assurance Security Architecture for Future Avionics
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
IEEE Security and Privacy
Practical, transparent operating system support for superpages
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
IEEE Security and Privacy
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Trusted hardware: can it be trustworthy?
Proceedings of the 44th annual Design Automation Conference
Designing secure systems on reconfigurable hardware
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Security Primitives for Reconfigurable Hardware-Based Systems
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Formal Modeling and Verification of Security Property in Handel C Program
International Journal of Secure Software Engineering
Hi-index | 0.00 |
While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection. Several reconfigurable cores are often integrated onto a single chip where they share external resources such as memory. While this enables small form factor and low cost designs, it opens up the opportunity for modules to intercept or even interfere with the operation of one another. We investigate the design and synthesis of a memory protection mechanism capable of enforcing policies expressed as a formal language. Our approach includes a specialized compiler that translates a policy of legal sharing to reconfigurable logic blocks which can be directly transferred to an FPGA. The efficiency of our access language design flow is evaluated in terms of area and cycle time across a variety of security scenarios.