TY - GEN
T1 - Dynamic Computational Diversity with Multi-Radix Logic and Memory
AU - Flikkema, Paul G.
AU - Palmer, James
AU - Yalcin, Tolga
AU - Cambou, Bertr
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/9/22
Y1 - 2020/9/22
N2 - Today's computing systems are highly vulnerable to attacks, in large part because nearly all computers are part of a hardware and software monoculture of machines in its market, industry or sector. This is of special concern in mission-critical networked systems upon which our civil, industrial, and defense infrastructures increasingly rely. One approach to tackle this challenge is to endow these systems with dynamic computational diversity, wherein each processor assumes a sequence of unique variants, such that it executes only machine code encoded for a variant during the time interval of that variant's existence. The variants are drawn from a very large set, all adhering to a computational diversity architecture, which is based on an underlying instruction set architecture. Thus any population of machines belonging to a specific diversity architecture consists of a temporally dynamic set of essentially-unique variants. However, an underlying ISA enables development of a common development toolchain for the diversity architecture. Our approach is hardware-centric, relying on the rapidly developing microelectronics technologies of ternary computing, resistive RAM (ReRAM) memory, and physical unclonable functions. This paper describes our on-going work in dynamic computational diversity, which targets the principled design of a secure processor for embedded applications.
AB - Today's computing systems are highly vulnerable to attacks, in large part because nearly all computers are part of a hardware and software monoculture of machines in its market, industry or sector. This is of special concern in mission-critical networked systems upon which our civil, industrial, and defense infrastructures increasingly rely. One approach to tackle this challenge is to endow these systems with dynamic computational diversity, wherein each processor assumes a sequence of unique variants, such that it executes only machine code encoded for a variant during the time interval of that variant's existence. The variants are drawn from a very large set, all adhering to a computational diversity architecture, which is based on an underlying instruction set architecture. Thus any population of machines belonging to a specific diversity architecture consists of a temporally dynamic set of essentially-unique variants. However, an underlying ISA enables development of a common development toolchain for the diversity architecture. Our approach is hardware-centric, relying on the rapidly developing microelectronics technologies of ternary computing, resistive RAM (ReRAM) memory, and physical unclonable functions. This paper describes our on-going work in dynamic computational diversity, which targets the principled design of a secure processor for embedded applications.
KW - ReRAM
KW - computational diversity
KW - cybersecurity
KW - dynamic
KW - security
KW - ternary computation
UR - http://www.scopus.com/inward/record.url?scp=85099337922&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85099337922&partnerID=8YFLogxK
U2 - 10.1109/HPEC43674.2020.9286255
DO - 10.1109/HPEC43674.2020.9286255
M3 - Conference contribution
AN - SCOPUS:85099337922
T3 - 2020 IEEE High Performance Extreme Computing Conference, HPEC 2020
BT - 2020 IEEE High Performance Extreme Computing Conference, HPEC 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 IEEE High Performance Extreme Computing Conference, HPEC 2020
Y2 - 21 September 2020 through 25 September 2020
ER -