Skip to main content

Memory Protection on FPGAs

  • Chapter
Handbook of FPGA Design Security

Abstract

This chapter describes a memory access policy language (Huffmire et al., Proceedings of the European Symposium on Research in Computer Security (ESORICS), Hamburg, Germany, September 2006), based on formal regular languages, and demonstrates how this language can express classical security policies, including isolation, controlled sharing, and Chinese wall. This chapter also describes a policy compiler (Huffmire et al., Proceedings of the European Symposium on Research in Computer Security (ESORICS), Hamburg, Germany, September 2006) that translates an access policy expressed in this language into a synthesizeable hardware module.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Aho, R. Sethi, J. Ullman, Compilers: Principles, Techniques, and Tools (Addison Wesley, Reading, 1988)

    Google Scholar 

  2. Altera Inc, Quartus II Manual, 2004

    Google Scholar 

  3. J.P. Anderson, Computer security technology planning study. Technical Report ESD-TR-73-51, ESD/AFSC, Hanscorn AFB, Bedford, MA, 1972

    Google Scholar 

  4. D.E. Bell, L.J. LaPadula, Secure computer systems: mathematical foundations and model. The MITRE Corporation, Bedford, MA, USA, May 1973

    Google Scholar 

  5. K.J. Biba, Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, 1977

    Google Scholar 

  6. D.F.C. Brewer, M.J. Nash, The Chinese wall security policy, in Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

    Google Scholar 

  7. D.E. Denning, A lattice model of secure information flow. Commun. ACM 19(5), 236–243 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  8. A. Gerzic, CodeGuru: write your own regular expression parser, November 2003, http://www.codeguru.com/

  9. T. Huffmire, S. Prasad, T. Sherwood, R. Kastner, Policy-driven memory protection for reconfigurable hardware, in Proceedings of the European Symposium on Research in Computer Security (ESORICS), Hamburg, Germany, September 2006

    Google Scholar 

  10. T. Huffmire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner, Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems, in Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2007

    Google Scholar 

  11. T. Huffmire, T. Sherwood, R. Kastner, T. Levin, Enforcing memory policy specifications in reconfigurable hardware. Comput. Secur. 27(5–6), 197–215 (2008)

    Article  Google Scholar 

  12. S. Johnson, Yacc: yet another compiler-compiler. Technical Report CSTR-32, Bell Laboratories, Murray Hill, NJ, 1975

    Google Scholar 

  13. M. Lesk, E. Schmidt, Lex: a lexical analyzer generator. Technical Report 39, Bell Laboratories, Murray Hill, NJ, October 1975

    Google Scholar 

  14. P. Linz, An Introduction to Formal Languages and Automata (Jones and Bartlett, Sudbury, 2001)

    Google Scholar 

  15. J. Navarro, S. Iyer, P. Druschel, A. Cox, Practical, transparent operating system support for Superpages, in Fifth Symposium on Operating Systems Design and Implementation (OSDI’02), Boston, MA, December 2002

    Google Scholar 

  16. D. Raymond, D. Wood, Grail: A C++ library for automata and expressions. J. Symb. Comput. 11, 341–350 (1995)

    Google Scholar 

  17. J. Rushby, A trusted computing base for embedded systems, in Proceedings 7th DoD/NBS Computer Security Conference, September 1984, pp. 294–311

    Google Scholar 

  18. J. Saltzer, Protection and the control of information sharing in Multics. Commun. ACM 17(7), 388–402 (1974)

    Article  Google Scholar 

  19. F.B. Schneider, Enforceable security policies. ACM Trans. Inform. Syst. Secur. 3(1), 30–50 (2000)

    Article  Google Scholar 

  20. G.W. Smith, R.B. Newton, A taxonomy of organisational security policies, in Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD, USA, October 2000

    Google Scholar 

  21. D.F. Sterne, On the buzzword “security policy”, in Proceedings of the 1991 IEEE Symposium on Security and Privacy, Oakland, CA, 1991, pp. 219–230

    Google Scholar 

  22. E. Witchel, J. Cates, K. Asanovic, Mondrian memory protection, in Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, CA, October 2002

    Google Scholar 

  23. M.E. Zurko, R.T. Simon, User-centered security, in Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, September 1996

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ted Huffmire .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Huffmire, T., Irvine, C., Nguyen, T.D., Levin, T., Kastner, R., Sherwood, T. (2010). Memory Protection on FPGAs. In: Handbook of FPGA Design Security. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-9157-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-9157-4_5

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-9156-7

  • Online ISBN: 978-90-481-9157-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics