Speculative virtual verification: policy-constrained speculative execution

  • Authors:
  • Michael E. Locasto;Stelios Sidiroglou;Angelos D. Keromytis

  • Affiliations:
  • Columbia University;Columbia University;Columbia University

  • Venue:
  • NSPW '05 Proceedings of the 2005 workshop on New security paradigms
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A key problem facing current computing systems is the inability to autonomously manage security vulnerabilities as well as more mundane errors. Since the design of computer architectures is usually performance-driven, hardware often lacks primitives for tasks in which raw speed is not the primary goal. There is little architectural support for monitoring execution at the instruction level, and no mechanisms for assisting an automated response.This paper advocates modifying general-purpose processors to provide both program supervision and automatic response via a policy-driven monitoring mechanism and instruction stream rewriting, respectively. These capabilities form the basis of speculative virtual verification (SVV).SVV is a model for the speculative execution of code based on high-level security and safety constraints. We introduce architectural enhancements to support this framework, including the ability to supply an automated response by rewriting the instruction stream. Finally, given the novelty of the SVV approach to executing software, we briefly consider some important challenges for SVV-based systems.