{"title":"CuPIDS enhances StUPIDS: exploring a co-processing paradigm shift in information system security","authors":"Paul D. Williams Eugene H. Spafford","doi":"10.1109/IAW.2005.1495943","DOIUrl":null,"url":null,"abstract":"The CuPIDS project is an exploration of increasing information system security by dedicating computational resources to system security tasks in a shared resource, multiprocessor (MP) architecture. Our research explores ways in which this architecture offers improvements over the traditional uniprocessor (UP) model of security. There are a number of areas to explore, one of which has a protected application running on one processor in a symmetric multiprocessing (SMP) system while a shadow process specific to that application runs on a different processor, monitoring its activity, ready to respond immediately if the application veers off course. This paper describes initial work into defining such an architecture and the prototype work done to validate our ideas.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2005.1495943","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The CuPIDS project is an exploration of increasing information system security by dedicating computational resources to system security tasks in a shared resource, multiprocessor (MP) architecture. Our research explores ways in which this architecture offers improvements over the traditional uniprocessor (UP) model of security. There are a number of areas to explore, one of which has a protected application running on one processor in a symmetric multiprocessing (SMP) system while a shadow process specific to that application runs on a different processor, monitoring its activity, ready to respond immediately if the application veers off course. This paper describes initial work into defining such an architecture and the prototype work done to validate our ideas.