Open Access Open Access  Restricted Access Subscription or Fee Access

Data Self-Healing Technique Using ASIC Level Security Mechanisms

M. Anand, S. Ravi, Kuldeep Chouhan, Syed Musthak Ahmed

Abstract


Computers have a plethora of different applications, spread over a wide spectrum of different branches such as electronic fund transfers, air traffic control, and storage of information in medical systems and so on. In all these security is an important aspect of any operating system and access of information to only properly authorized individuals or processes through the use of special security features should be ensured. The main objective of the proposed self healing scheme is to share and secure the information of any system at the same time. However, sharing and protection are two contradictory goals. Protection programs may be completely isolated from each other by executing them on separate non-networked computer, however, this precludes sharing. The proposed work provides data security based on Dynamic Information Flow Tracking by keeping track of the modified capabilities of the resources. A novel feature of this work is that the proposed architecture allows passive threats to co-exist, thus, making the architecture more user-friendly.

Keywords


Self-healing, ASIC, Data Security, PCI Bus, Snoop Cycle

Full Text:

PDF

References


S.Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R.K. Iyer, “Defeating Memory Corruption Attacks via Pointer Taintedness Detection”, in the proceedings of the International conference on Dependable Systems and networks ( DSN). Japan, June 2005.

S. Chen, J. Xu, E. C. Sezer, P.Gauriar, and R.K.Iyer, “Non-Control-Data Attacks Are Realistic Threats”, in the proceedings of the 14th USENIX Security symposium, Batlimore, MD, Aug. 2005.

M.Dalton, H. Kannan, and C. Kozvrakis, “Deconstructing Hardware Architectures for Security”, in the 5th Annual Workshop on Duplicating, Deconstructing and Debunking, Boston, MA, June 2006.

B. Livshits, M. Martin, and M.S. Lam, “Securely: Runtime Protection and recovery from Web Application Vulnerabilities”, Technical Report, Stanford University, Sept. 2006.

J. Newsome and D. X. Song, “Dynamic Taint Analysis, and Signature Generation of Exploits on Commodity Software”, in the Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, Feb. 2005.

F. Qin, C. Wang, Z. Li, H. seop Kim, Y. Zhou, and Y. Wu, “LIFT: A Low- Level- Overhead Practical Information Flow Tracking System for Detecting Security Attacks”, in the proceedings of the 39th Intl. Symposium on Micro-architecture, Orlando, FL, Dec. 2006.

W. Shi, H.-H. Lee, G. Gu, Falk, T. Mudge, and M. Ghosh, “Infoshield: A Security Architecture for Protecting Information Usage in Memory”, in the proceedings of the 12th International Symposium on High- Performance Computer Architecture, Austin, TX, Feb. 2006.

W. Xu, S. Bhaskar, and R. Sekar, “Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks”, in the proceedings of the 15th USENIX Security Conference, Vancouver Canada, 2006.

Michael Dalton, Hari Kannan, Christos Kozyrakis, “Raksha: A Flexible Information Flow Architecture”, for Software Security from the technical paper, Computer Systems Laboratory, Stanford University, mwdalton, hkannan, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.