Award Abstract # 0524771
Collaborative Research: CT-T: Adaptive Security and Separation in Reconfigurable Hardware

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF CALIFORNIA, SANTA BARBARA
Initial Amendment Date: July 29, 2005
Latest Amendment Date: July 29, 2005
Award Number: 0524771
Award Instrument: Standard Grant
Program Manager: carl landwehr
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: August 1, 2005
End Date: July 31, 2009 (Estimated)
Total Intended Award Amount: $603,935.00
Total Awarded Amount to Date: $603,935.00
Funds Obligated to Date: FY 2005 = $603,935.00
History of Investigator:
  • Timothy Sherwood (Principal Investigator)
    sherwood@cs.ucsb.edu
  • Ryan Kastner (Co-Principal Investigator)
Recipient Sponsored Research Office: University of California-Santa Barbara
3227 CHEADLE HALL
SANTA BARBARA
CA  US  93106-0001
(805)893-4188
Sponsor Congressional District: 24
Primary Place of Performance: University of California-Santa Barbara
3227 CHEADLE HALL
SANTA BARBARA
CA  US  93106-0001
Primary Place of Performance
Congressional District:
24
Unique Entity Identifier (UEI): G9QBQDH39DF4
Parent UEI:
NSF Program(s): ITR-CYBERTRUST
Primary Program Source: app-0105 
Program Reference Code(s): 7254, 9218, HPCC
Program Element Code(s): 745600
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

NSF 0524771

CT-T: Collaborative Research: Adaptive Security and Separation in Reconfigurable Hardware

PI: Timothy Sherwood, University of California-Santa Barbara, Cynthia Irvine, Naval Postgraduate School

From Bluetooth transceivers to the NASA Mars Rover, reconfigurable circuits have become one of the mainstays of embedded design. Combining the high computational performance of specialized circuits with the re-programmability of software, these devices are quickly becoming ubiquitous. Unfortunately, if unprotected, this reconfigurability could be exploited to disrupt critical operations, snoop on supposedly secure channels, or even to physically melt a device. However, a new approach to controlling changes to the hardware logic promises to overcome these problems. In addition, the innate malleability of this hardware presents the opportunity for hardware enforcement of adaptive security policies. For example, in an emergency, trusted individuals may need to override the nominal security policy. Thus, the reconfigurable component may provide a highly trusted mechanism for secure functionality in changing environments.

This research aims to close a gaping security hole in our nation's information infrastructure by enhancing the logical structure and internal management of reconfigurable hardware to enforce a dynamic information protection policy. Specifically, this research will: (1) discover hardware synthesis and static validation methods that will ensure that only secure and non-destructive configurations can be loaded, (2) develop new reconfigurable structures capable of securely mediating run-time access to shared resources through the use of hardware-compiled formal access policy languages, and (3) establish a firm foundation for trustworthy dynamic policy enforcement through ontological analysis, formal modeling and the development of management mechanisms integrating the results of the first two activities.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Shashidhar Mysore, Banit Agrawal, Sheng-Chih Lin, Navin Srivastava, Kaustav Banerjee and Timothy Sherwood "Introspective 3D Chips" Proceedings of the Twelfth International Conference on Architectural Support for Programming Languages and Operating Systems , 2006
Shashidhar Mysore, Bita Mazloom, Banit Agrawal, and Timothy Sherwood "Understanding and Visualizing Full Systems with Data Flow Tomography" Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) , 2008
Ted Huffmire, Brett Brotherton, Gang Wang, Tim Sherwood, Ryan Kastner, Timothy Levin, Thuy Nguyen, Cynthia Irvine "Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems" Proceedings of the IEEE Symposium on Security and Privacy , 2007
Ted Huffmire, Shreyas Prasad, Tim Sherwood and Ryan Kastner "Policy-Driven Memory Protection for Reconfigurable Hardware" Proceedings of the European Symposium on Research in Computer Security , 2006

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page