The Intel 80/spl times/86 processor architecture: pitfalls for secure systems

@article{Sibert1995TheI8,
  title={The Intel 80/spl times/86 processor architecture: pitfalls for secure systems},
  author={Olin Sibert and Phillip A. Porras and Robert Lindell},
  journal={Proceedings 1995 IEEE Symposium on Security and Privacy},
  year={1995},
  pages={211-222}
}
An in-depth analysis of the 80/spl times/86 processor families identifies architectural properties that may have unexpected, and undesirable, results in secure computer systems. In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems. We discuss the imbalance in scrutiny for hardware protection mechanisms relative to software, and why this imbalance is increasingly difficult to… CONTINUE READING

Figures and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-10 OF 21 CITATIONS

Automatic Derivation of Platform Noninterference Properties

VIEW 1 EXCERPT
CITES BACKGROUND

Leakage in Trustworthy Systems

VIEW 2 EXCERPTS
CITES BACKGROUND

Microarchitectural Attacks and Countermeasures

VIEW 1 EXCERPT
CITES BACKGROUND

A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat

VIEW 1 EXCERPT
CITES BACKGROUND

Side-Channel Attack Pitfalls

  • Kris Tiri
  • Computer Science
  • 2007 44th ACM/IEEE Design Automation Conference
  • 2007
VIEW 1 EXCERPT
CITES BACKGROUND

Trusted Hardware: Can It Be Trustworthy?

VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 10 REFERENCES

Volume 3: Architecture and Programming Manual

  • Pentium Processor User's Manual
  • Order Number 241430-001, Intel Corporation, Santa Clara, CA,
  • 1994
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

A n Analysis of Coved Timing hannels

  • WraySl John C. Wray
  • Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,
  • 1991

A hierarchical methodology for verifying microprogrammed microprocessors

  • Phillip J. Windley
  • Computer Science
  • Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1990

Advanced 80386 Programming Techniqups, Osbourne McGraw-H xll

  • L. 'hrley
  • 1988

Implementing high integrity systems: the VIPER microprocessor

  • W. J. Cullyer
  • Computer Science
  • IEEE Aerospace and Electronic Systems Magazine
  • 1988

Reverification of a microprocessor

CA

  • Virgil D. Gligor, Analyszs of the Hardware Verification of the Honeywell SCOMP, Proceedings of the IEEE Computer Society Symposium on Research Security, Privacy, Oakland
  • pages 32-43,
  • 1985
VIEW 1 EXCERPT

Multics Security Evaluation: Vulnerability Anaiysis, Air Force Electronic Systems Division ESD-TR74-193, Volume

  • R. Schell
  • 1974