< Back to previous page
Publication
Reflections on post-Meltdown trusted computing: A case for open security processors
Journal Contribution - Journal Article
The recent wave of microarchitectural vulnerabilities in commodity
hardware requires us to question our understanding of system security. We
deplore that even for processor architectures and research prototypes with
an explicit focus on security, open-source designs remain the exception.
This article and call for action briefly surveys ongoing community efforts
for developing a new generation of open security architectures, for
which we collectively have a clear understanding of execution semantics and
the resulting security implications. We advocate formal approaches to
reason about the security guarantees that these architectures can provide,
including the absence of microarchitectural bugs and side-channels. We
consider such a principled approach essential in an age where society
increasingly relies on interconnected and dependable control systems.
Finally, we aim to inspire strong industrial and academic collaboration in
such an engineering effort, which we believe is too monumental to be
suitably addressed by a single enterprise or research community.
Journal: Login: the USENIX magazine
ISSN: 1044-6397
Issue: 3
Volume: 43
Pages: 1 - 4
Publication year:2018
Accessibility:Open