Hierarchical application aware error detection and recovery
Proceedings of the 41st annual Design Automation Conference
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 10 - Volume 11
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
Proceedings of the 33rd annual international symposium on Computer Architecture
Toward Application-Aware Security and Reliability
IEEE Security and Privacy
Exploring recovery from operating system lockups
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Error-resilient motion estimation architecture
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Architecture Design for Soft Errors
Architecture Design for Soft Errors
IVEC: off-chip memory integrity protection for both security and reliability
Proceedings of the 37th annual international symposium on Computer architecture
Design of a secure packet processor
Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Securing the data path of next-generation router systems
Computer Communications
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Nanoscale technologies: prospect or hazard to dependable and secure computing?
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
A survey and taxonomy of on-chip monitoring of multicore systems-on-chip
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Reli: hardware/software checkpoint and recovery scheme for embedded processors
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Automated Algorithmic Error Resilience for Structured Grid Problems Based on Outlier Detection
Proceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization
Hi-index | 0.00 |
This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level framework called the Reliability andSecurity Engine (RSE), which is implemented as an integralpart of a modern microprocessor. The RSE interacts with theprocessor through an input/output interface. The CHECKinstruction, a special extension of the instruction set architectureof the processor, is the interface of the application withthe RSE. The detection mechanisms described here in detailare: (1) the Memory Layout Randomization (MLR) module,which randomizes the memory layout of a process in order tofoil attackers who assume a fixed system layout, (2) the DataDependency Tracking (DDT) module, which tracks the dependenciesamong threads of a process and maintains checkpointsof shared memory pages in order to rollback thethreads when an offending (potentially malicious) thread isterminated, and (3) the Instruction Checker module (ICM),which checks an instruction for its validity or the control-flowof the program just as the instruction enters the pipeline forexecution. Performance simulations for the studied modulesindicate low overhead of the proposed solutions.