Trusted ILLIAC - A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing Ravishankar Iyer, Wen-mei Hwu, Klara Nahrstedt,

Slides:



Advertisements
Similar presentations
Computer Systems & Architecture Lesson 2 4. Achieving Qualities.
Advertisements

Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient High-integrity Multi-core Systems Artemis-AAL day 7 May, Budapest 1BME and.
HARDWARE SOFTWARE PARTITIONING AND CO-DESIGN PRINCIPLES MADHUMITA RAMESH BABU SUDHI PROCH 1/37.
ECE 720T5 Fall 2011 Cyber-Physical Systems Rodolfo Pellizzoni.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
CS 795 – Spring  “Software Systems are increasingly Situated in dynamic, mission critical settings ◦ Operational profile is dynamic, and depends.
Dynamic Service Composition with QoS Assurance Feb , 2009 Jing Dong UTD Farokh Bastani UTD I-Ling Yen UTD.
Hiperspace Lab University of Delaware Antony, Sara, Mike, Ben, Dave, Sreedevi, Emily, and Lori.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
1 SWE Introduction to Software Engineering Lecture 21 – Architectural Design (Chapter 13)
Components and Architecture CS 543 – Data Warehousing.
Application architectures
1 Achieving Trusted Systems by Providing Security and Reliability (Research Project #22) Project Members: Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun.
Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers (
Achieving Trusted Systems by Providing Security and Reliability Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun Xu, Shuo Chen, Nithin Nakka and Karthik Pattabiraman.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Figure 1.1 Interaction between applications and the operating system.
In vfprintf(), if (fmt points to “%n”) then **ap = (character count) Achieving Trusted Systems by Providing Security and Reliability FORMAL REASONING ON.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 8: Autonomic computing.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
November 18, 2004 Embedded System Design Flow Arkadeb Ghosal Alessandro Pinto Daniele Gasperini Alberto Sangiovanni-Vincentelli
UCB November 8, 2001 Krishna V Palem Proceler Inc. Customization Using Variable Instruction Sets Krishna V Palem CTO Proceler Inc.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
1 Web Testing CIS 376 Bruce R. Maxim UM-Dearborn.
Database Management Systems (DBMS)
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
Application architectures
RRB/STS ORNL Workshop Integrated Hardware/Software Security Support R. R. BrooksSam T. Sander Associate ProfessorAssistant Professor Holcombe Department.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Secure Embedded Processing through Hardware-assisted Run-time Monitoring Zubin Kumar.
Secure Virtual Architecture John Criswell, Arushi Aggarwal, Andrew Lenharth, Dinakar Dhurjati, and Vikram Adve University of Illinois at Urbana-Champaign.
Module 14: WCF Send Adapters. Overview Lesson 1: Introduction to WCF Send Adapters Lesson 2: Consuming a Web Service Lesson 3: Consuming Services from.
Integrating Fine-Grained Application Adaptation with Global Adaptation for Saving Energy Vibhore Vardhan, Daniel G. Sachs, Wanghong Yuan, Albert F. Harris,
1 The Design of a Robust Peer-to-Peer System Gisik Kwon Dept. of Computer Science and Engineering Arizona State University Reference: SIGOPS European Workshop.
Illinois Center for Wireless Systems Wireless Security Quantification and Mechanisms Bill Sanders Professor, Electrical and Computer Engineering Director,
Ravi K. Iyer Information Trust Institute Coordinated Science Laboratory University of Illinois at Urbana-Champaign A Configurable Hardware Framework for.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool
Senior Project Ideas: Blind Communication & Internet Measurements Mehmet H. Gunes.
Development Timelines Ken Kennedy Andrew Chien Keith Cooper Ian Foster John Mellor-Curmmey Dan Reed.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Kyushu University Koji Inoue ICECS'061 Supporting A Dynamic Program Signature: An Intrusion Detection Framework for Microprocessors Koji Inoue Department.
MAPLD Reconfigurable Computing Birds-of-a-Feather Programming Tools Jeffrey S. Vetter M. C. Smith, P. C. Roth O. O. Storaasli, S. R. Alam
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Issues Autonomic operation (fault tolerance) Minimize interference to applications Hardware support for new operating systems Resource management (global.
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
1 INTRUSION TOLERANT SYSTEMS WORKSHOP Phoenix, AZ 4 August 1999 Jaynarayan H. Lala ITS Program Manager.
Exploiting Instruction Streams To Prevent Intrusion Milena Milenkovic.
Creating Security using Software and Hardware Bradley Herrup CS297- Security and Programming Languages.
Grigore Rosu Founder, President and CEO Professor of Computer Science, University of Illinois
The Potential of Sampling for Dynamic Analysis Joseph L. GreathouseTodd Austin Advanced Computer Architecture Laboratory University of Michigan PLAS, San.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
Protocol Security for Wireless Networks Yih-Chun Hu Illinois Center for Wireless Systems.
Enabling Control over Adaptive Program Transformation for Dynamically Evolving Mobile Software Validation Mike Jochen, Anteneh Anteneh, Lori Pollock University.
1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci.
A Framework For Trusted Instruction Execution Via Basic Block Signature Verification Milena Milenković, Aleksandar Milenković, and Emil Jovanov Electrical.
SESM Demonstrator FPGA Power Node Prototype Emilio Bisbiglio, SESM, Przemyslaw Osocha, SESM,
Application architectures. Objectives l To explain the organisation of two fundamental models of business systems - batch processing and transaction processing.
ATTRACT TWD Symposium, Barcelona, Spain, 1st July 2016
Distributed Databases
Athith Amarnath, graduate Student Database and Security Research Group
Human Complexity of Software
Model-Driven Engineering for Mission-Critical IoT Systems
QuaSAQ: Enabling End-to-End QoS for Distributed Multimedia Databases
Presentation transcript:

Trusted ILLIAC - A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing Ravishankar Iyer, Wen-mei Hwu, Klara Nahrstedt, William Sanders, Zbigniew Kalbarczyk Memory Data Vision Reliability and Security Engine (RSE) Advanced Compiler (IMPACT) Title Global Infotech: Pathways to the Future with Global Partnerships  Provide applications-specific level of reliability and security, while delivering optimal performance  Customized levels of trust enforced via an integrated approach involving re-programmable hardware, compiler methods to: (i) extract security and reliability properties and (ii) accelerate computation configurable OS and middleware Reconfigurable processor-level hardware framework to provide application-aware checks for reliability and security  Processor, framework, and modules on single die  Framework and modules implemented on an FPGA  Framework configured to:  embed hardware modules needed by application  route inputs to modules Enable automated generation of hardware to prototype and demonstrate: (i) acceleration of computation and (ii) application- aware detectors in realistic scenarios Middleware Services for Preventing DoS Attacks in Large-Scale Systems Subset of trusted nodes called oversight nodes cooperate to manage node download information objects Develop security middleware services to control multimedia streaming in a secure and robust fashion. Node 0x0 Node 0x7 Node 0x1 Node 0x5 Node 0x2 Node 0x3 Node 0x6 Node 0x4 request grant Node 0x6 Node 0x4 Node 0x2 Node 0x0 media object key 0x3 rate = 350 Node 0x5 Node 0x3 Node 0x7 Node 0x1 Request media object 0x3 media object key 0x6 rate = 350 media object key 0x1 rate = 350 node download info for node 0x4 current = 1050 max allowed = 1000 Node 0x2 node download information key 0x4 current = 700 max allowed = 1000 Node 0x5 Node 0x7 Retrieve node download information for node 0x4 Send node download information for node 0x4 node download information key 0x4 current = 700 max allowed = 1000 Node 0x6 Node 0x4 Node 0x2 Node 0x0 media object key 0x3 rate = 350 Node 0x5 Node 0x3 Node 0x7 Node 0x1 Request media object 0x3 Query about node 0x4 adding 350 to download rate Deny request from node 0x4 Deny media object key 0x6 rate = 350 media object key 0x1 rate = 350 Without Oversight With Oversight Nodes Static Analysis Trusted ILLIAC Node Validation of Trusted ILLIAC Configurations (Möbius Modeling Environment) Möbius atomic models represent different Trusted ILLIAC node designs and attack/fault models. Preserving system health using adaptive recovery Model Driven Recovery Controller  Path based monitors to detect failures  Probabilistic Bayesian diagnosis to estimate cause of failure  Stochastic planning to choose recovery action Model-Driven Trust Management  Choose security-critical variables based on application semantics  Employ a compile-time static program analysis to extract backward slice which collates all dependent instructions along each control-path form a signature, which encodes dependences as a set (or sequence) of instruction PCs along each control-path  Program data-flow violations indicate of malicious tampering Considering Misbehaving users Malicious users Selfish users Signature extraction Transform the derived signatures in the runtime assertions to be integrated within the application code or implemented in hardware for on-line error checking