03.12.2016 Views

128-Bit Addressing in RISC-V and Security

Tue1530-128bit-Addr-RISC-V-Wallach-Micron

Tue1530-128bit-Addr-RISC-V-Wallach-Micron

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Some FoundaConal Basis<br />

• One should recognize that concentraCon on<br />

protecCon <strong>and</strong> authenCcaCon mechanisms<br />

provides a narrow view of <strong>in</strong>formaCon<br />

security ,<strong>and</strong> that a narrow view is<br />

dangerous .The objecRve of a secure system<br />

is to prevent all unauthorized use of<br />

<strong>in</strong>formaRon, a negaRve k<strong>in</strong>d of<br />

requirement.<br />

• Every access to every object must be<br />

checked for authority. This pr<strong>in</strong>ciple, when<br />

systemaCcally applied, is the primary<br />

underp<strong>in</strong>n<strong>in</strong>g of the protecCon system<br />

• Validity/AuthenRcity is a REQUIREMENT<br />

(Ref D. Clark, personal communicaRons)<br />

[2] Schroder & Saltzer, “The protecCon of <strong>in</strong>formaCon <strong>in</strong> computer systems”,<br />

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER 1975<br />

2016 _NOV _<strong>RISC</strong>V_WORKSHOP<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!