Safe and Chaotic Compilation for Hidden Deterministic Hardware Aliasing

05/19/2019
by   Peter T. Breuer, et al.
0

Hardware aliasing occurs when the same logical address can access different physical memory locations. This is a problem for software on some embedded systems and more generally when hardware becomes faulty in irretrievable locations, such as on a Mars Lander. We show how to work around the hardware problem with software logic, compiling code so it works on any platform with hardware aliasing with hidden determinism. That is: (i) a copy of an address accesses the same location, and (ii) repeating an address calculation exactly will repeat the same access again. Stuck bits can mean that even adding zero to an address can make a difference in that environment so nothing but a systematic approach has a chance of working. The technique is extended to generate aliasing as well as compensate for it, in so-called chaotic compilation, and a sketch proof is included to show it may produce object code that is secure against discovery of the programmer's intention. A prototype compiler implementing the technology covers all of ANSI C except longjmp/setjmp.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/30/2019

Safe Compilation for Hidden Deterministic Hardware Aliasing and Encrypted Computing

Hardware aliasing occurs when the same logical address sporadically acce...
research
07/01/2020

Is Rust Used Safely by Software Developers?

Rust, an emerging programming language with explosive growth, provides a...
research
07/17/2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses

Rowhammer is a hardware vulnerability in DRAM memory, where repeated acc...
research
07/26/2023

Modal Abstractions for Virtualizing Memory Addresses

Operating system kernels employ virtual memory management (VMM) subsyste...
research
09/01/2020

Helper Without Threads: Customized Prefetching for Delinquent Irregular Loads

The growing memory footprints of cloud and big data applications mean th...
research
06/13/2023

SafeBet: Secure, Simple, and Fast Speculative Execution

Spectre attacks exploit microprocessor speculative execution to read and...

Please sign up or login with your details

Forgot password? Click here to reset