This simulation of a KPU (general purpose Krypto-processor) extends the OpenRISC or1ksim simulator to cover the OR 64-bit standard, and runs encrypted in user mode with 32-bit data and addressing encrypted in 64 bits of physical space.
Privileged supervisor processes cannot read user-mode data, nor modify it without being noticed.
This demonstration shows that it is possible to modify standard architectures (such as OR) to support KPU operation. The aim is to make user mode processes invulnerable to attacks from supervisor processes, despite their privilege. So nobody needs to watch the watchers, or guard the guards, .. whatever.
Supervisor mode continues to work satisfactorily for servicing interrupts but sees the data being transferred as word-sized unopenable black boxes.
Downloads:
0 This Week