03.12.2016 Views

128-Bit Addressing in RISC-V and Security

Tue1530-128bit-Addr-RISC-V-Wallach-Micron

Tue1530-128bit-Addr-RISC-V-Wallach-Micron

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ProtecCon ObjecCves<br />

• The orig<strong>in</strong>al moCvaCon for puyng<br />

protecCon mechanisms <strong>in</strong>to<br />

computer systems was to keep one<br />

user’s (program) malice or error from<br />

harm<strong>in</strong>g other users (program). Harm<br />

can be <strong>in</strong>flicted <strong>in</strong> several ways:<br />

– a) By destroy<strong>in</strong>g or modify<strong>in</strong>g another<br />

user’s (program) data.<br />

– b) By read<strong>in</strong>g or copy<strong>in</strong>g another user’s<br />

(program) data without permission.<br />

– c) By degrad<strong>in</strong>g the service another user<br />

(program) gets, for example, us<strong>in</strong>g up all<br />

the disk space or geyng more than a fair<br />

share of the process<strong>in</strong>g Cme<br />

[1] Lampson, ProtecCon. Proc. 5th Pr<strong>in</strong>ceton Conf. on Informa2on<br />

Sciences <strong>and</strong> Systems, Pr<strong>in</strong>ceton, 1971<br />

2016 _NOV _<strong>RISC</strong>V_WORKSHOP 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!