128-Bit Addressing in RISC-V and Security
Tue1530-128bit-Addr-RISC-V-Wallach-Micron
Tue1530-128bit-Addr-RISC-V-Wallach-Micron
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Some FoundaConal Basis<br />
• One should recognize that concentraCon on<br />
protecCon <strong>and</strong> authenCcaCon mechanisms<br />
provides a narrow view of <strong>in</strong>formaCon<br />
security ,<strong>and</strong> that a narrow view is<br />
dangerous .The objecRve of a secure system<br />
is to prevent all unauthorized use of<br />
<strong>in</strong>formaRon, a negaRve k<strong>in</strong>d of<br />
requirement.<br />
• Every access to every object must be<br />
checked for authority. This pr<strong>in</strong>ciple, when<br />
systemaCcally applied, is the primary<br />
underp<strong>in</strong>n<strong>in</strong>g of the protecCon system<br />
• Validity/AuthenRcity is a REQUIREMENT<br />
(Ref D. Clark, personal communicaRons)<br />
[2] Schroder & Saltzer, “The protecCon of <strong>in</strong>formaCon <strong>in</strong> computer systems”,<br />
PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER 1975<br />
2016 _NOV _<strong>RISC</strong>V_WORKSHOP<br />
10