Security Hardening against Hardware Vulnerabilities through Hardware Separation

Dr. Erez Shmueli, Industrial Engineering, Tel Aviv University;

Prof. Assaf Schuster, Computer Science Department, Technion;

Dr. Nadav Amit, Computer Science Department, Technion;


The recently discovered security vulnerabilities that exploit micro-architectural properties introduce new challenging attack vectors. Adapted mitigation techniques address the discovered vulnerabilities, but might not prevent other yet unknown ones. Moreover, the overheads of existing mitigation techniques are high and may deter users from enabling them. Current protection schemes against these vulnerabilities are rather complicated, and consist of an extensive operating system (OS) changes and new microcode features. Due to this scheme complexity, the protection from these vulnerabilities might be incomplete. Furthermore, it is yet unclear whether future CPU enhancements will render the current complicated protection scheme unnecessary.

In our research, we wish to explore the solution space for the mitigation against this new class of security vulnerabilities, including yet undiscovered ones, and to study the inherent trade-off between protection and performance. To protect against these vulnerabilities, we wish to take a more drastic measure, by separating the hardware resources, compute, and memory, which are allocated to the OS and its processes. This separation can be done in different levels to serve diverse purposes: weak separation to complement current protection schemes by alleviating their overheads, and strong separation to protect against unknown security threats.

Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained
here and / or the use of such content is in your opinion infringing, Contact us as soon as possible >>