The Aberdeen Architecture is a high assurance microprocessor architecture concept which implements Saltzer and Schroeder’s 1975 security principles in hardware. Current microprocessors execute instructions without any verification or authentication. Saltzer and Schroeder defined fundamental security principles: complete mediation, and open design. Complete mediation means to verify access rights and authority for every operation. Protection mechanisms should be based on open design principles: protecting keys, not design secrecy. In 2002, Mann describes how secrecy makes systems brittle and subject to catastrophic failure. The Aberdeen Architecture is high assurance computer architecture based on ‘open design’ principles, complete mediation, and RISC-V instruction set architecture. Aberdeen Architecture uses several hardware state machine monitors to enforce hardware security policies for the execution pipeline. The state machines’ security policies cover instruction execution, control flow integrity, data flow integrity, and memory access integrity. The individual security policies provide overlapping coverage. The security of the whole architecture is greater than the sum of the individual parts. The Aberdeen Architecture provides near complete mediation for instruction execution. This paper presents an introduction to the Aberdeen Architecture
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.