Award Abstract # 1814190
SaTC: STARSS: Small: Collaborative: Design and Security Verification of Next-Generation Open-Source Processors

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: THE TRUSTEES OF PRINCETON UNIVERSITY
Initial Amendment Date: August 14, 2018
Latest Amendment Date: August 14, 2018
Award Number: 1814190
Award Instrument: Standard Grant
Program Manager: Daniela Oliveira
doliveir@nsf.gov
 (703)292-0000
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: October 1, 2018
End Date: September 30, 2021 (Estimated)
Total Intended Award Amount: $165,597.00
Total Awarded Amount to Date: $165,597.00
Funds Obligated to Date: FY 2018 = $165,597.00
History of Investigator:
  • Ruby Lee (Principal Investigator)
Recipient Sponsored Research Office: Princeton University
1 NASSAU HALL
PRINCETON
NJ  US  08544-2001
(609)258-3090
Sponsor Congressional District: 12
Primary Place of Performance: Princeton University
87 Prospect Avenue, 2nd floor
Princeton
NJ  US  08544-2020
Primary Place of Performance
Congressional District:
12
Unique Entity Identifier (UEI): NJ1YPQXQG7U5
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001819DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 021Z, 025Z, 7434, 7923, 9102
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

This project will develop new open-source processor architectures with advanced security features. The security features will be added to existing open-source processors to help protect the confidentiality and integrity of data and to protect against side-channel attacks. Beyond the design, the project will also provide new methodology to verify the proposed security feature, to provide assurance that the processor hardware itself is provably secure.

The first thrust of the project focuses on side-channel protections, especially of processor caches, and other functional units that can be exploited to leak secret information. It further adds security counters and new means to protect trusted software modules. The second thrust focuses on the design of the security verification approaches for hardware, including the use of satisfiability modulo theories (SMT) based solvers and temporal logics.

If successful, this will make open-source processors and their applications more secure against attacks. It will enable the academic community to further develop and extend the capabilities of the ope-source secure processor and further education in hardware security.

All artefacts developed by this project will be available online at http://caslab.csl.yale.edu/code/ or http://palms.ee.princeton.edu. The web sites will be maintained for the duration of the project and as long as the research groups involved in this project are active.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 12)
Guangyuan Hu, Zecheng He "Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support" TinyML Research Symposium21 , 2021 Citation Details
He, Zecheng and Hu, Guangyuan and Lee, Ruby "New Models for Understanding and Reasoning about Speculative Execution Attacks" IEEE International Symposium on High-Performance Computer Architecture (HPCA) , 2021 https://doi.org/10.1109/HPCA51647.2021.00014 Citation Details
He, Zecheng and Raghavan, Aswin and Hu, Guangyuan and Chai, Sek and Lee, Ruby "Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning" 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom) , 2019 https://doi.org/10.1109/TrustCom/BigDataSE.2019.00030 Citation Details
He, Zecheng and Zhang, Tianwei and Lee, Ruby "Sensitive-Sample Fingerprinting of Deep Neural Networks" IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , 2019 https://doi.org/10.1109/CVPR.2019.00486 Citation Details
He, Zecheng and Zhang, Tianwei and Lee, Ruby B. "Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems" IEEE Internet of Things Journal , 2020 https://doi.org/10.1109/JIOT.2020.3022358 Citation Details
He, Zecheng and Zhang, Tianwei and Lee, Ruby B. "Model inversion attacks against collaborative inference" 35th Annual Computer Security Applications Conference (ACSAC) , 2019 https://doi.org/10.1145/3359789.3359824 Citation Details
Hu, Guangyuan and He, Zecheng and Lee, Ruby B. "SoK: Hardware Defenses Against Speculative Execution Attacks" 2021 International Symposium on Secure and Private Execution Environment Design (SEED) , 2021 https://doi.org/10.1109/SEED51797.2021.00023 Citation Details
Hu, Guangyuan and Zhang, Tianwei and Lee, Ruby B. "Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks" HASP '20: Hardware and Architectural Support for Security and Privacy , 2020 https://doi.org/10.1145/3458903.3458909 Citation Details
Lee, Ruby B. "Speculative Execution Attacks and Hardware Defenses" ASHES '21: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security , 2021 https://doi.org/10.1145/3474376.3487404 Citation Details
Zecheng He, Ruby B. "CloudShield: Real-time Anomaly Detection in the Cloud" arXiv Computer Science Cryptography and Security , 2021 Citation Details
Zhang, Tianwei and Szefer, Jakub and Lee, Ruby B. "Practical and Scalable Security Verification of Secure Architectures" Hardware and Architectural Support for Security and Privacy , 2021 https://doi.org/10.1145/3505253.3505256 Citation Details
(Showing: 1 - 10 of 12)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Project Outcomes: 

Design and Security Verification of Next-Generation Open-Source Processors

PI Ruby Lee, Princeton University

The goal of our project was to explore advanced security features for next-generation open-source processors.  We studied hardware defenses for known and new attacks, and new approaches for improving security using deep learning.  We studied security defenses for cache side-channel attacks and the recent devastating speculative execution attacks on microprocessors.  We focused initially on the open source RISC-V processors, then broadened this to all microprocessors.

Speculative execution attacks exploit hardware performance optimization features to illegally access secret information, then leak the secrets to an unauthorized recipient. New speculative attacks keep appearing since Spectre and Meltdown first appeared in January 2018. Our work includes providing new insights into these attacks by 1) modelling speculative execution attacks with similar attack graphs, 2) identifying missing security links in these attack graphs that can prevent these attacks which we call "security dependencies" and 3) systematizing the hardware defenses that can be (and have been) proposed to defeat these speculative attacks. We identified the critical attack steps in all speculative attacks and showed how preventing one of these steps can defeat the attack, and how security-performance tradeoffs can be made safely to improve performance without allowing information leakage.

We believe that one of the most important features for improving security in future processors is by using deep learning techniques.  Towards this end, we showed how deep learning can improve security across very different computer systems, from power-grid controllers, smartphones, IOT devices, to cloud computers.  We showed how a tiny hardware module can be added to detect anomalous behavior in a smartphone to detect imposter usage of the smartphone.  This won the Best Paper award at the TinyML Research Symposium in 2021.  Based on the same deep learning and statistical algorithms, anomalous behavior in controllers for critical infrastructures like the power-grid can be detected in real-time with extremely high accuracy. We also showed that a pre-trained deep learning model, enhanced with more advanced statistical techniques, can detect anomalous behavior in cloud computing servers. Furthermore, we show how to distinguish between benign anomalies and malicious anomalies (i.e., attacks) to reduce false alarms.

Finally, we showed a methodology for practical and scalable security verification of computer systems which are larger and more complicated than what formal methods can typically handle. This can contribute to the assurance of hardware-software security systems and is especially useful in the design stage for security architectures where changes can be made more easily.

By providing better security for next generation processors, the broader impact of this work can improve the security of all computer systems and computing devices that we use in our every day lives. It also can improve information security and privacy and the security of all digital infrastructures.

Selected publications:

[1] Zecheng He, Guangyuan Hu, Ruby B. Lee, "New Models for Understanding and Reasoning about Speculative Execution Attacks", IEEE International Symposium on High-Performance Computer Architecture (HPCA), April 2021. DOI: 10.1109/HPCA51647.2021.00014

[2] Guangyuan Hu, Zecheng He, Ruby B. Lee, "SoK: Hardware Defenses Against Speculative Execution Attacks", International Symposium on Secure and Private Execution Environment Design (SEED), September, 2021. DOI: 10.1109/SEED51797.2021.00023.

[3] Zecheng He, Aswan Raghavan, Guangyuan Hu, Sek Chai and Ruby Lee, "Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning", --18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom). DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2019.00030

[4] Guangyuan Hu, Zecheng He, Ruby B. Lee, "Smarthphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support", TinyML Research Symposioum'21, March 2021. DOI: 10.48550/arXiv.2103.06453 Best Paper Award.

[5] Zecheng He, Ruby B. Lee, "CloudShield: Real-time Anomaly Detection in the Cloud", arXiv Computer Science Cryptography and Security, August 2021.
DOI: 10.48550/arXIV.2108.08977

[6] Tianwei Zhang, Jakub Szefer; Ruby B. Lee, "Practical and Scalable Security Verification of Secure Architectures", Hardware and Architectural Support for Security and Privacy (HASP), October 2021. DOI: 10.1145/3505253.3505256


Last Modified: 01/27/2023
Modified by: Ruby Lee

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page