Hardware Support for Safety Interlocks and Introspection

  • Authors:
  • Udit Dhawan;Albert Kwon;Edin Kadric;Catalin Hritcu;Benjamin C. Pierce;Jonathan M. Smith;Andre DeHon;Gregory Malecha;Greg Morrisett;Thomas F. Knight;Andrew Sutherland;Tom Hawkins;Amanda Zyxnfryx;David Wittenberg;Peter Trei;Sumit Ray;Greg Sullivan

  • Affiliations:
  • -;-;-;-;-;-;-;-;-;-;-;-;-;-;-;-;-

  • Venue:
  • SASOW '12 Proceedings of the 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Hardware interlocks that enforce semantic invariants and allow fine-grained privilege separation can be built with reasonable costs given modern semiconductor technology. In the common error-free case, these mechanisms operate largely in parallel with the intended computation, monitoring the semantic intent of the computation on an operation-by-operation basis without sacrificing cycles to perform security checks. We specifically explore five mechanisms: (1) pointers with manifest bounds (fat pointers), (2) hardware types (atomic groups), (3) processor-supported authority, (4)authority-changing procedure calls (gates), and (5) programmable metadata validation and propagation (tags and dynamic tag management). These mechanisms allow the processor to continuously introspect on its operation, efficiently triggering software handlers on events that require logging, merit sophisticated inspection, or prompt adaptation. We present results from our prototype FPGA implementation of a processor that incorporates these mechanisms, quantifying the logic, memory, and latency requirements. We show that the dominant cost is the wider memory necessary to hold our metadata (the atomic groups and programmable tags), that the added logic resources make up less than 20% of the area of the processor, that the concurrent checks do not degrade processor cycle time, and that the tag cache is comparable to a small L1 data cache.