Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trusted ILLIAC - A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing Ravishankar Iyer, Wen-mei Hwu, Klara Nahrstedt,

Similar presentations


Presentation on theme: "Trusted ILLIAC - A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing Ravishankar Iyer, Wen-mei Hwu, Klara Nahrstedt,"— Presentation transcript:

1 Trusted ILLIAC - A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing Ravishankar Iyer, Wen-mei Hwu, Klara Nahrstedt, William Sanders, Zbigniew Kalbarczyk Memory Data Vision Reliability and Security Engine (RSE) Advanced Compiler (IMPACT) Title Global Infotech: Pathways to the Future with Global Partnerships  Provide applications-specific level of reliability and security, while delivering optimal performance  Customized levels of trust enforced via an integrated approach involving re-programmable hardware, compiler methods to: (i) extract security and reliability properties and (ii) accelerate computation configurable OS and middleware Reconfigurable processor-level hardware framework to provide application-aware checks for reliability and security  Processor, framework, and modules on single die  Framework and modules implemented on an FPGA  Framework configured to:  embed hardware modules needed by application  route inputs to modules Enable automated generation of hardware to prototype and demonstrate: (i) acceleration of computation and (ii) application- aware detectors in realistic scenarios Middleware Services for Preventing DoS Attacks in Large-Scale Systems Subset of trusted nodes called oversight nodes cooperate to manage node download information objects Develop security middleware services to control multimedia streaming in a secure and robust fashion. Node 0x0 Node 0x7 Node 0x1 Node 0x5 Node 0x2 Node 0x3 Node 0x6 Node 0x4 request grant Node 0x6 Node 0x4 Node 0x2 Node 0x0 media object key 0x3 rate = 350 Node 0x5 Node 0x3 Node 0x7 Node 0x1 Request media object 0x3 media object key 0x6 rate = 350 media object key 0x1 rate = 350 node download info for node 0x4 current = 1050 max allowed = 1000 Node 0x2 node download information key 0x4 current = 700 max allowed = 1000 Node 0x5 Node 0x7 Retrieve node download information for node 0x4 Send node download information for node 0x4 node download information key 0x4 current = 700 max allowed = 1000 Node 0x6 Node 0x4 Node 0x2 Node 0x0 media object key 0x3 rate = 350 Node 0x5 Node 0x3 Node 0x7 Node 0x1 Request media object 0x3 Query about node 0x4 adding 350 to download rate Deny request from node 0x4 Deny media object key 0x6 rate = 350 media object key 0x1 rate = 350 Without Oversight With Oversight Nodes Static Analysis Trusted ILLIAC Node Validation of Trusted ILLIAC Configurations (Möbius Modeling Environment) Möbius atomic models represent different Trusted ILLIAC node designs and attack/fault models. Preserving system health using adaptive recovery Model Driven Recovery Controller  Path based monitors to detect failures  Probabilistic Bayesian diagnosis to estimate cause of failure  Stochastic planning to choose recovery action Model-Driven Trust Management  Choose security-critical variables based on application semantics  Employ a compile-time static program analysis to extract backward slice which collates all dependent instructions along each control-path form a signature, which encodes dependences as a set (or sequence) of instruction PCs along each control-path  Program data-flow violations indicate of malicious tampering Considering Misbehaving users Malicious users Selfish users Signature extraction Transform the derived signatures in the runtime assertions to be integrated within the application code or implemented in hardware for on-line error checking


Download ppt "Trusted ILLIAC - A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing Ravishankar Iyer, Wen-mei Hwu, Klara Nahrstedt,"

Similar presentations


Ads by Google