亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing

计算机科学 计算机安全 安全性测试 建筑 软件安全保证 计算机安全模型 企业信息安全体系结构 保安服务 云安全计算 分布式计算 嵌入式系统 安全信息和事件管理 云计算 信息安全 操作系统 艺术 视觉艺术
作者
Dan Meng,Rui Hou,Gang Shi,Bibo Tu,Aimin Yu,Ziyuan Zhu,Xiaoqi Jia,Peng Liu
出处
期刊:Cybersecurity [Springer Nature]
卷期号:1 (1) 被引量:12
标识
DOI:10.1186/s42400-018-0001-z
摘要

It is fundamentally challenging to build a secure system atop the current computer architecture. The complexity in software, hardware and ASIC manufacture has reached beyond the capability of existing verification methodologies. Without whole-system verification, current systems have no proven security. It is observed that current systems are exposed to a variety of attacks due to the existence of a large number of exploitable security vulnerabilities. Some vulnerabilities are difficult to remove without significant performance impact because performance and security can be conflicting with each other. Even worse, attacks are constantly evolving, and sophisticated attacks are now capable of systematically exploiting multiple vulnerabilities while remain hidden from detection. Eagering to achieve security hardening of current computer architecture, existing defenses are mostly ad hoc and passive in nature. They are normally developed in responding to specific attacks spontaneously after specific vulnerabilities were discovered. As a result, they are not yet systematic in protecting systems from existing attacks and likely defenseless in front of zero-day attacks. To confront the aforementioned challenges, this paper proposes Security-first Architecture, a concept which enforces systematic and active defenses using Active Security Processors. In systems built based on this concept, traditional processors (i.e., Computation Processors) are monitored and protected by Active Security Processors. The two types of processors execute on their own physically-isolated resources, including memory, disks, network and I/O devices. The Active Security Processors are provided with dedicated channels to access all the resources of the Computation Processors but not vice versa. This allows the Active Security Processors to actively detect and tackle malicious activities in the Computation Processors with minimum performance degradation while protecting themselves from the attacks launched from the Computation Processors thanks to the resource isolation.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
2秒前
LL发布了新的文献求助10
6秒前
科研通AI6.3应助lala采纳,获得10
35秒前
CipherSage应助科研通管家采纳,获得10
42秒前
57秒前
1分钟前
2分钟前
NexusExplorer应助科研通管家采纳,获得10
2分钟前
4分钟前
彭于晏应助饱满的半青采纳,获得10
4分钟前
科研通AI2S应助科研通管家采纳,获得10
4分钟前
深情安青应助ww采纳,获得10
6分钟前
ww完成签到,获得积分20
6分钟前
6分钟前
ww发布了新的文献求助10
6分钟前
豌豆苗完成签到 ,获得积分10
6分钟前
6分钟前
爆米花应助ww采纳,获得10
6分钟前
6分钟前
二狗完成签到 ,获得积分10
7分钟前
Owen应助空城采纳,获得10
7分钟前
爆米花应助饱满的半青采纳,获得10
7分钟前
7分钟前
等等发布了新的文献求助10
7分钟前
饱满的半青完成签到 ,获得积分10
7分钟前
李健应助Morwin采纳,获得10
8分钟前
文艺沉鱼完成签到 ,获得积分10
8分钟前
zhangqian完成签到 ,获得积分10
8分钟前
田様应助科研通管家采纳,获得10
8分钟前
直率海莲完成签到 ,获得积分10
8分钟前
等等发布了新的文献求助10
9分钟前
仁爱的蜻蜓完成签到,获得积分10
10分钟前
10分钟前
10分钟前
10分钟前
星辰大海应助狂野的衬衫采纳,获得30
10分钟前
10分钟前
欢喜寻双发布了新的文献求助10
10分钟前
11分钟前
11分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Elements of Propulsion: Gas Turbines and Rockets, Second Edition 1000
卤化钙钛矿人工突触的研究 1000
Engineering for calcareous sediments : proceedings of the International Conference on Calcareous Sediments, Perth 15-18 March 1988 / edited by R.J. Jewell, D.C. Andrews 1000
Wolffs Headache and Other Head Pain 9th Edition 1000
Continuing Syntax 1000
Signals, Systems, and Signal Processing 510
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6246086
求助须知:如何正确求助?哪些是违规求助? 8069601
关于积分的说明 16845447
捐赠科研通 5322785
什么是DOI,文献DOI怎么找? 2834180
邀请新用户注册赠送积分活动 1811677
关于科研通互助平台的介绍 1667430