Skip to main content

Showing 1–4 of 4 results for author: Kohlbrenner, D

.
  1. arXiv:2303.17881  [pdf, other

    cs.CR cs.AR

    Pentimento: Data Remanence in Cloud FPGAs

    Authors: Colin Drewes, Olivia Weng, Andres Meza, Alric Althoff, David Kohlbrenner, Ryan Kastner, Dustin Richmond

    Abstract: Cloud FPGAs strike an alluring balance between computational efficiency, energy efficiency, and cost. It is the flexibility of the FPGA architecture that enables these benefits, but that very same flexibility that exposes new security vulnerabilities. We show that a remote attacker can recover "FPGA pentimenti" - long-removed secret data belonging to a prior user of a cloud FPGA. The sensitive dat… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

    Comments: 17 Pages, 8 Figures

  2. arXiv:2211.02179  [pdf, other

    cs.CR

    Verifying RISC-V Physical Memory Protection

    Authors: Kevin Cheang, Cameron Rasmussen, Dayeol Lee, David W. Kohlbrenner, Krste Asanović, Sanjit A. Seshia

    Abstract: We formally verify an open-source hardware implementation of physical memory protection (PMP) in RISC-V, which is a standard feature used for memory isolation in security critical systems such as the Keystone trusted execution environment. PMP provides per-hardware-thread machine-mode control registers that specify the access privileges for physical memory regions. We first formalize the functiona… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: SECRISC-V 2019 Workshop

  3. arXiv:1907.10119  [pdf, other

    cs.CR cs.OS

    Keystone: An Open Framework for Architecting TEEs

    Authors: Dayeol Lee, David Kohlbrenner, Shweta Shinde, Dawn Song, Krste Asanović

    Abstract: Trusted execution environments (TEEs) are being used in all the devices from embedded sensors to cloud servers and encompass a range of cost, power constraints, and security threat model choices. On the other hand, each of the current vendor-specific TEEs makes a fixed set of trade-offs with little room for customization. We present Keystone -- the first open-source framework for building customiz… ▽ More

    Submitted 7 September, 2019; v1 submitted 23 July, 2019; originally announced July 2019.

    Comments: 18 pages

  4. arXiv:1812.10605  [pdf, other

    cs.CR

    Sanctorum: A lightweight security monitor for secure enclaves

    Authors: Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas

    Abstract: Enclaves have emerged as a particularly compelling primitive to implement trusted execution environments: strongly isolated sensitive user-mode processes in a largely untrusted software environment. While the threat models employed by various enclave systems differ, the high-level guarantees they offer are essentially the same: attestation of an enclave's initial state, as well as a guarantee of e… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

    Comments: 6 pages