
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | July 1, 2021 |
Latest Amendment Date: | July 28, 2023 |
Award Number: | 2106629 |
Award Instrument: | Continuing Grant |
Program Manager: |
Marilyn McClure
mmcclure@nsf.gov (703)292-5197 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | October 1, 2021 |
End Date: | September 30, 2025 (Estimated) |
Total Intended Award Amount: | $349,954.00 |
Total Awarded Amount to Date: | $349,954.00 |
Funds Obligated to Date: |
FY 2023 = $120,262.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
4000 CENTRAL FLORIDA BLVD ORLANDO FL US 32816-8005 (407)823-0387 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
FL US 32816-8005 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | CSR-Computer Systems Research |
Primary Program Source: |
01002122DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Memory safety is essential. Despite decades of research, unauthorized memory reads and writes are still among the most common security attacks. The emerging persistent memory (PM) amplifies the importance of strong memory protections. As a promising supplement or substitute of DRAM as main memory, PM offers higher density, better scaling potential, lower idle power, and non-volatility, while retaining byte addressability and random accessibility. But PM poses some principled differences for protection in comparison to traditional memory in several ways: PM keeps persistent data so data corruption is persistent and costlier; there is no obvious way to recover from data corruption; due to PM data being long lived, its content and structure and hence the impact of data corruption are likely shared by one or more applications over time. This project aims to significantly advance the understanding of PM memory protection, establish the foundation for persistence-conscious memory protection, create a set of novel techniques for protecting PM memory, and for detection, recovery, and diagnostic of PM corruption.
The growth of computer performance that has enabled many scientific discoveries and inventions, is slowing down due to the looming end of Moore?s Law. Persistent memory (PM) is one of promising post-Moore?s Law technology that is expected to get into the mainstream computing devices, from internet of things devices all the way to the cloud. This research anticipates security vulnerabilities of the use of PM and attempts to mitigate potential security breaches that could cause tremendous loss to the industry, defense, scientific research, health, and many other domains that will be relying on future computing devices.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.