RISC-V High Assurance FPGA Softcore Aberdeen Architecture

Objective
“RISC-V High Assurance FPGA Softcore Aberdeen Architecture,” research topic is to create asoftcore processor based on the concepts presented in [1]-[7] and RISC-V [8] instruction set architecture.
Description
The government shall provide phase I contractor(s) with a non-exclusive, royalty free, government/commercial use license for US patents [1]-[2], and pending patent [3] for 10 years to develop a FPGA softcore based Aberdeen Architecture. License is not transferable. License ends if the company changes ownership, is sold, merges with another company (ies), etc.
Tiwari [9] describes the current performance at all costs approach. “Almost every recent microarchitectural technique is built around the notion of optimizing the common case… if one is protecting a secret or handling untrusted data, every operation performed on that secret will affect those internal states in one way or another. Non-interference requires that those affected internal states are then in no way visible to the other components [all hardware and software]”.
All shared resources result in covert channels leaking information. Malicious actors can modulate shared resources to leak more information. No hardware resource can base decisions on information from more than one process at a time. As early as 1975, Saltzer and Lipner [10] pointed out that covert channels in Multics leak information. In 2005, Bernstein [11] showed how timing information leaks AES key bit information. In 2009, Acıiçmez, et al. [12] illustrated how a branch predictor (a shared hardware resource) can be manipulated or modulated to leak key bit information.
In 2018, Spectre [13] and Meltdown [14] attacks maliciously manipulate hardware to leak information. To truly implement Saltzer and Schroeder’s security principles [15]-[17]; the security policy must be enforced from the hardware system architecture’s lowest level. Instruction execution must be at least one level above the security policy level, e.g. software cannot override, nor interact with any aspect of the security policy.
The OS Friendly Microprocessor Architecture or Redstone Architecture in [5] describes the cache bank, tag fields, and extended Harvard bus architecture for the Aberdeen Architecture. The Redstone Architecture provides for near real-time (a few clock cycles) context switching. The near zero context switch time offers another solution to information leakage prone conventional architectures.
In a traditional computer, an operating system manages computer system resources. Current microprocessors execute or run instructions without any verification or authentication. There is no difference between safe instructions, coding errors, and malicious instructions. Complete mediation [14] is a computer security principle meaning to verify access rights and authority for every operation. The Aberdeen Architecture can achieve near complete mediation for instruction execution [4].
The Aberdeen Architecture is also designed to block information leakage. It uses hardware-level state machine monitors for the trusted computing base. The state machine monitors provide security policies enforcing multiple information flow properties. The Aberdeen Architecture combines several protection methods to create a system security policy where the whole is greater than the individual security policies. The multiple security policies provide overlapping coverage, preventing brittleness and single-point security policy failures.
Phase I
For the Phase I proposal, research team shall describe the feasibility of developing a softcore Aberdeen Architecture implementation. The offeror shall investigate the high assurance capabilities of information flow tracking and monitoring. The offeror shall investigate state machine monitoring parallelism and the potential for providing very low latency security policies.
The offeror shall investigate the feasibility of creating a software compiler to take advantage of the Aberdeen Architecture security policies. For the phase I effort, the offeror shall demonstrate the feasibility and high assurance benefits of the Aberdeen Architecture over a conventional microprocessor. The offeror shall provide a close out report describing the proposed FPGA softcore architecture and compiler.
Phase II
Research team shall develop an Aberdeen Architecture FPGA softcore implementation and software compiler. Research team shall deliver a year 1 report and a year 2 report describing Aberdeen Architecture and test results. Research team shall deliver a FPGA softcore and compiler computer architecture report.
Offeror shall propose a demonstration project with government concurrence for the Phase II development effort. Offeror shall deliver to the government point of contact for test and evaluation: 2 prototype Aberdeen Architecture systems, compiler, all codes, software, etc. and licenses for all development tools to build and use the system. Research team shall provide 5 days of on-site training for the system.
Phase III
Offeror shall commercialize Aberdeen Architecture for both government and commercial application spaces. Aberdeen Architecture offers potential benefits across several fields including banking, communications, telecom, medical electronics, aerospace, automotive electronics, and networking.
Submission Information
For more information, and to submit your full proposal package, visit the DSIP Portal.
SBIR|STTR Help Desk: usarmy.sbirsttr@army.mil
References:
Objective
“RISC-V High Assurance FPGA Softcore Aberdeen Architecture,” research topic is to create asoftcore processor based on the concepts presented in [1]-[7] and RISC-V [8] instruction set architecture.
Description
The government shall provide phase I contractor(s) with a non-exclusive, royalty free, government/commercial use license for US patents [1]-[2], and pending patent [3] for 10 years to develop a FPGA softcore based Aberdeen Architecture. License is not transferable. License ends if the company changes ownership, is sold, merges with another company (ies), etc.
Tiwari [9] describes the current performance at all costs approach. “Almost every recent microarchitectural technique is built around the notion of optimizing the common case… if one is protecting a secret or handling untrusted data, every operation performed on that secret will affect those internal states in one way or another. Non-interference requires that those affected internal states are then in no way visible to the other components [all hardware and software]”.
All shared resources result in covert channels leaking information. Malicious actors can modulate shared resources to leak more information. No hardware resource can base decisions on information from more than one process at a time. As early as 1975, Saltzer and Lipner [10] pointed out that covert channels in Multics leak information. In 2005, Bernstein [11] showed how timing information leaks AES key bit information. In 2009, Acıiçmez, et al. [12] illustrated how a branch predictor (a shared hardware resource) can be manipulated or modulated to leak key bit information.
In 2018, Spectre [13] and Meltdown [14] attacks maliciously manipulate hardware to leak information. To truly implement Saltzer and Schroeder’s security principles [15]-[17]; the security policy must be enforced from the hardware system architecture’s lowest level. Instruction execution must be at least one level above the security policy level, e.g. software cannot override, nor interact with any aspect of the security policy.
The OS Friendly Microprocessor Architecture or Redstone Architecture in [5] describes the cache bank, tag fields, and extended Harvard bus architecture for the Aberdeen Architecture. The Redstone Architecture provides for near real-time (a few clock cycles) context switching. The near zero context switch time offers another solution to information leakage prone conventional architectures.
In a traditional computer, an operating system manages computer system resources. Current microprocessors execute or run instructions without any verification or authentication. There is no difference between safe instructions, coding errors, and malicious instructions. Complete mediation [14] is a computer security principle meaning to verify access rights and authority for every operation. The Aberdeen Architecture can achieve near complete mediation for instruction execution [4].
The Aberdeen Architecture is also designed to block information leakage. It uses hardware-level state machine monitors for the trusted computing base. The state machine monitors provide security policies enforcing multiple information flow properties. The Aberdeen Architecture combines several protection methods to create a system security policy where the whole is greater than the individual security policies. The multiple security policies provide overlapping coverage, preventing brittleness and single-point security policy failures.
Phase I
For the Phase I proposal, research team shall describe the feasibility of developing a softcore Aberdeen Architecture implementation. The offeror shall investigate the high assurance capabilities of information flow tracking and monitoring. The offeror shall investigate state machine monitoring parallelism and the potential for providing very low latency security policies.
The offeror shall investigate the feasibility of creating a software compiler to take advantage of the Aberdeen Architecture security policies. For the phase I effort, the offeror shall demonstrate the feasibility and high assurance benefits of the Aberdeen Architecture over a conventional microprocessor. The offeror shall provide a close out report describing the proposed FPGA softcore architecture and compiler.
Phase II
Research team shall develop an Aberdeen Architecture FPGA softcore implementation and software compiler. Research team shall deliver a year 1 report and a year 2 report describing Aberdeen Architecture and test results. Research team shall deliver a FPGA softcore and compiler computer architecture report.
Offeror shall propose a demonstration project with government concurrence for the Phase II development effort. Offeror shall deliver to the government point of contact for test and evaluation: 2 prototype Aberdeen Architecture systems, compiler, all codes, software, etc. and licenses for all development tools to build and use the system. Research team shall provide 5 days of on-site training for the system.
Phase III
Offeror shall commercialize Aberdeen Architecture for both government and commercial application spaces. Aberdeen Architecture offers potential benefits across several fields including banking, communications, telecom, medical electronics, aerospace, automotive electronics, and networking.
Submission Information
For more information, and to submit your full proposal package, visit the DSIP Portal.
SBIR|STTR Help Desk: usarmy.sbirsttr@army.mil
References:
RISC-V High Assurance FPGA Softcore Aberdeen Architecture