
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | July 29, 2005 |
Latest Amendment Date: | July 29, 2005 |
Award Number: | 0524771 |
Award Instrument: | Standard Grant |
Program Manager: |
carl landwehr
CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | August 1, 2005 |
End Date: | July 31, 2009 (Estimated) |
Total Intended Award Amount: | $603,935.00 |
Total Awarded Amount to Date: | $603,935.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
3227 CHEADLE HALL SANTA BARBARA CA US 93106-0001 (805)893-4188 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
3227 CHEADLE HALL SANTA BARBARA CA US 93106-0001 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | ITR-CYBERTRUST |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
NSF 0524771
CT-T: Collaborative Research: Adaptive Security and Separation in Reconfigurable Hardware
PI: Timothy Sherwood, University of California-Santa Barbara, Cynthia Irvine, Naval Postgraduate School
From Bluetooth transceivers to the NASA Mars Rover, reconfigurable circuits have become one of the mainstays of embedded design. Combining the high computational performance of specialized circuits with the re-programmability of software, these devices are quickly becoming ubiquitous. Unfortunately, if unprotected, this reconfigurability could be exploited to disrupt critical operations, snoop on supposedly secure channels, or even to physically melt a device. However, a new approach to controlling changes to the hardware logic promises to overcome these problems. In addition, the innate malleability of this hardware presents the opportunity for hardware enforcement of adaptive security policies. For example, in an emergency, trusted individuals may need to override the nominal security policy. Thus, the reconfigurable component may provide a highly trusted mechanism for secure functionality in changing environments.
This research aims to close a gaping security hole in our nation's information infrastructure by enhancing the logical structure and internal management of reconfigurable hardware to enforce a dynamic information protection policy. Specifically, this research will: (1) discover hardware synthesis and static validation methods that will ensure that only secure and non-destructive configurations can be loaded, (2) develop new reconfigurable structures capable of securely mediating run-time access to shared resources through the use of hardware-compiled formal access policy languages, and (3) establish a firm foundation for trustworthy dynamic policy enforcement through ontological analysis, formal modeling and the development of management mechanisms integrating the results of the first two activities.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.