2018
DOI: 10.1109/tcad.2018.2857321
|View full text |Cite
|
Sign up to set email alerts
|

PAGURUS: Low-Overhead Dynamic Information Flow Tracking on Loosely Coupled Accelerators

Abstract: Software-based attacks exploit bugs or vulnerabilities to get unauthorized access or leak confidential information. Dynamic information flow tracking (DIFT) is a security technique to track spurious information flows and provide strong security guarantees against such attacks. To secure heterogeneous systems, the spurious information flows must be tracked through all their components, including processors, accelerators (i.e., applicationspecific hardware components) and memories. We present PAGU-RUS, a flexibl… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…Additionally, the address space is bounded by using extended instructions to enforce access control on different parties. [19] proposed an IP wrapper to protect access to IPs from software. The DIFT operations are implemented as hardware logic in the IP wrapper to check for malicious access.…”
Section: Gate-level Diftmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, the address space is bounded by using extended instructions to enforce access control on different parties. [19] proposed an IP wrapper to protect access to IPs from software. The DIFT operations are implemented as hardware logic in the IP wrapper to check for malicious access.…”
Section: Gate-level Diftmentioning
confidence: 99%
“…Piccolboni et al. in [ 19 ] proposed an IP wrapper to protect access to IPs from software. The DIFT operations are implemented as hardware logic in the IP wrapper to check for malicious access.…”
Section: Hardware-assisted Dynamic Information Flow Trackingmentioning
confidence: 99%
See 1 more Smart Citation
“…Many cryptographic cores naturally map into HLS languages, making it an attractive approach for designing cryptographic hardware. While it is easy to measure the performance, power, and resource usage, there is not a standard, built-in way to determine the security of a particular design [5]. It is thus important to understand how these HLS optimizations effect the design's security alongside the traditional power, performance, and resource usage metrics.…”
Section: Introductionmentioning
confidence: 99%