SlideShare a Scribd company logo
Digital Security by Design
EPSRC Call for Proposals:
ISCF Digital Security by Design Research Projects
Opening date: 26 September 2019
Closing date: 07 January 2020
Panel meeting: April 2020
Grants start date: June 2020
• Leveraging the Capability Hardware concepts and approaches
investigated by the CHERI program (led by the University of
Cambridge), a consortium led by Arm is investigating a prototype
silicon-based solution based on Arm AArch64 architecture.
• This prototype solution will be made openly available to academics
and businesses across the UK, so as to provide early access,
evaluation, and the opportunity to feed back on the proposed major
change to the instruction set architecture of a processor, while
investigating the broader impact to various aspects of computer
science and ICT in general.
Background
Challenge Activities
Technology Platform
Prototype: deliver a proven
secure-by-default hardware
evaluation board and
system software
Collaborative R&D to enable
market use: tooling and
processes to utilise the new
security capabilities; community
engagement
Business-led demonstrators: sector-
specific adoptions e.g. IoT, connected
vehicles, AI, and/or financial services to
show-case real-world impact and move
the accepted norm
£9m£49.8m £11.2m
1. Enable 2. Use 3. Impact
• The University of Cambridge have published a descriptive article:
‘Introduction to CHERI’ – available at
https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/dsbd.html.
• (Link is accessible from the EPSRC Call webpage and the Call
document)
Capability Hardware: CHERI
• Up to £8M (at 80% FEC) available to support academic research
projects across all three of the objectives within the scope of the Call
• Timeline:
Opening date: 26 September 2019
Workshop/webinar: November 2019
Closing date: 07 January 2020
Panel meeting: April 2020
Grants start date: 1 June 2020
EPSRC Call for Proposals
Activity
1.1:
• Delivering a devboard through a direct grant to a business-led
consortium. The results will be openly available.
Activity
1.2:
• Academic-led white-hat testing and proof of platform/architecture
Activity
1.3b:
• Academic-led projects to broaden the system software and
approaches enabled by the new platform
Activity
1.4:
• Academic research into the longer term impacts and
consequences of the resulting changes
Challenge activities relevant to the Call
Objective 1:
• Capability
enabled
hardware
proof and
software
verification
Objective 2:
• Impact on
system
software
and libraries
Objective 3:
• Future
implications
of Capability
Hardware
Call Objectives
• Despite the historical best efforts of hardware to execute software as
expected by software, it became impossible to reason on its completeness
given the lack of formal specification of the hardware architecture and the
complexity of any specific design.
• Various advances are being made with respect to the formal proof of
hardware resulting in the increasing accuracy and formal specification of
the hardware architecture. However, linking the work of hardware proof
with software reasoning and verification in the context of Capability
Hardware needs significant research to find a methodology by which the
final intent of an application can be understood and verified, including side-
channel effect in the hardware, and the limited specification for data
encapsulation and privilege in software.
Objective 1: Capability enabled hardware
and software verification
• Through the introduction of Capability enabled Hardware, what tools or techniques can
be applied in limiting and/or identifying leakage of information, including but not limited
to, containment analysis and various forms of information flow within software?
• Can (and if so, how can) the formal specifications of hardware be extended to include
microarchitectural artefacts beyond the architectural specification often responsible for
side-channel or inference-based information leakage?
• How can a system dynamically learn and monitor the correct operation of a platform’s
intent, to provide necessary information to mitigate inappropriate operations potentially
identified as a divergence from a runtime specification or a learning associated with
historic operation?
• Given a formal executable hardware architectural specification, how can we increase the
capabilities and understanding of formal method and proof with respect to the expected
execution of software, its proof and verification?
Objective 1: Example research questions
• There are various implications and potential solutions to extending current software
and “end-2-end” security schemes to include the movement of data with fine grain
protection and inherited rights. For example, how to extend cryptography frameworks to
extend the protection of information from the point of encryption to the point of use in an
application, through the application of Capability Hardware.
• Existing platforms support various software and hardware assisted mechanisms to
encapsulate the various states of an application as an aid towards increasing security or
limiting visibility of data. Whether this is through a managed runtime, a trusted execution
engine, the interpretation and translation of binaries, or larger grain hardware protection
schemes, the introduction of fine grain data containerisation and access privilege will
bring new opportunities and new threats. Investigations are required to understand these
implications and to propose how existing system software and libraries will adapt to such
new hardware mechanisms.
Objective 2: Impact on system software
and libraries
• How can existing managed runtimes, high-level languages or systems
leveraging binary translation of code benefit from the introduction of
Capability enabled Hardware and improve the security of applications
and services?
• What are the impacts and opportunities from Capability Hardware to
increase the security between and within platforms, using a trusted
execution engine (TEE) or other virtualization technologies? How will
the delivery or use of such technologies change?
• How can the increased security provided by Capability Hardware be
extended robustly to operate security over a distributed system?
Objective 2: Example research questions
• When virtual memory was first introduced, the ways in which this
coarse grain memory partitioning and access privilege would be used
was unknown. Although various characteristics of how virtual
memory is managed by a processor has evolved, the fundamental
concepts remain unchanged.
• Given the wider challenge objective to introduce fine grain
compartmentalisation and inherited privilege capabilities to a
processor, the future implications and potential use cases are
unknown. The aim of this objective is to fund early stage research
into the longer term implications of the new memory projection
paradigm.
Objective 3: Future implications of
Capability Hardware
• Today’s operating systems use virtual memory for the protection of code
and data, process isolation and the associated scheduling mechanisms.
Since a Capability enabled processor offers stronger and more fine
grained protection than current systems, what might the implications and
opportunities be when reconsidering these requirements of an operating
system?
• What are the implications and opportunities of Capability Hardware
existing in the central processing unit (CPU) on other hardware devices
such as direct memory access (DMA) devices and processors of a digital
system and their associated software stacks?
Objective 3: Example research questions
• Applicants invited to submit proposals that meet one of the three
objectives within the Call
• Eligibility: any single investigator can only apply once, as either a PI
or Co-I
• Postal peer review followed by prioritisation panel (if reviews are
sufficiently supportive)
• Portfolio approach will be taken to final funding decisions to ensure
coverage across, and within, the three objectives
Call structure and format
• Event before the Call closes - to allow for further discussion between
potential applicants/collaborators, and with the CHERI investigators
and Arm representatives
• Format tbc – face to face workshop or webinar
• To be held November 2019
Workshop / webinar
Thank you

More Related Content

Similar to Digital Security by Design: ISCF Digital Security by Design Research Projects - Natasha Richardson

Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
Pawan Sharma
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
Alexey Pyshkin
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
IJERA Editor
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
university of education,Lahore
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 
software engineering
software engineering software engineering
software engineering
bharati vidhyapeeth uni.-pune
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
MITDaveMillaar
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
Arlene Smith
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
MuhammadTalha436
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
Kaptur mrd questions
Kaptur mrd questionsKaptur mrd questions
Kaptur mrd questions
JISC funded KAPTUR project
 
Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019
MuhammadTalha436
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system designRahul Hedau
 
Backhaul Options for Public Safety
Backhaul Options for Public SafetyBackhaul Options for Public Safety
Backhaul Options for Public Safety
Clint Smith
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
Winstina Kennedy
 
Design patterns
Design patternsDesign patterns
Design patterns
ACCESS Health Digital
 
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
KTN
 

Similar to Digital Security by Design: ISCF Digital Security by Design Research Projects - Natasha Richardson (20)

Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Sdlc 4
Sdlc 4Sdlc 4
Sdlc 4
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
software engineering
software engineering software engineering
software engineering
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
 
A Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic InstitutionA Case Study On Implementation Of Grid Computing To Academic Institution
A Case Study On Implementation Of Grid Computing To Academic Institution
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Kaptur mrd questions
Kaptur mrd questionsKaptur mrd questions
Kaptur mrd questions
 
Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
 
Backhaul Options for Public Safety
Backhaul Options for Public SafetyBackhaul Options for Public Safety
Backhaul Options for Public Safety
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 
Design patterns
Design patternsDesign patterns
Design patterns
 
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
 

More from KTN

Competition Briefing - Open Digital Solutions for Net Zero Energy
Competition Briefing - Open Digital Solutions for Net Zero Energy Competition Briefing - Open Digital Solutions for Net Zero Energy
Competition Briefing - Open Digital Solutions for Net Zero Energy
KTN
 
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
KTN
 
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
KTN
 
UK Catalysis: Innovation opportunities for an enabling technology
UK Catalysis: Innovation opportunities for an enabling technologyUK Catalysis: Innovation opportunities for an enabling technology
UK Catalysis: Innovation opportunities for an enabling technology
KTN
 
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
KTN
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
KTN
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
KTN
 
Smart Networks and Services Joint Undertaking (SNS JU) Call Topics
Smart Networks and Services Joint Undertaking (SNS JU) Call TopicsSmart Networks and Services Joint Undertaking (SNS JU) Call Topics
Smart Networks and Services Joint Undertaking (SNS JU) Call Topics
KTN
 
Building Talent for the Future 2 – Expression of Interest Briefing
Building Talent for the Future 2 – Expression of Interest BriefingBuilding Talent for the Future 2 – Expression of Interest Briefing
Building Talent for the Future 2 – Expression of Interest Briefing
KTN
 
Connected and Autonomous Vehicles Cohort Workshop
Connected and Autonomous Vehicles Cohort WorkshopConnected and Autonomous Vehicles Cohort Workshop
Connected and Autonomous Vehicles Cohort Workshop
KTN
 
Biodiversity and Food Production: The Future of the British Landscape
Biodiversity and Food Production: The Future of the British LandscapeBiodiversity and Food Production: The Future of the British Landscape
Biodiversity and Food Production: The Future of the British Landscape
KTN
 
Engage with...Performance Projects
Engage with...Performance ProjectsEngage with...Performance Projects
Engage with...Performance Projects
KTN
 
How to Create a Good Horizon Europe Proposal Webinar
How to Create a Good Horizon Europe Proposal WebinarHow to Create a Good Horizon Europe Proposal Webinar
How to Create a Good Horizon Europe Proposal Webinar
KTN
 
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
KTN
 
Engage with...Custom Interconnect
Engage with...Custom InterconnectEngage with...Custom Interconnect
Engage with...Custom Interconnect
KTN
 
Engage with...ZF
Engage with...ZFEngage with...ZF
Engage with...ZF
KTN
 
Engage with...FluxSys
Engage with...FluxSysEngage with...FluxSys
Engage with...FluxSys
KTN
 
Made Smarter Innovation: Sustainable Smart Factory Competition Briefing
Made Smarter Innovation: Sustainable Smart Factory Competition BriefingMade Smarter Innovation: Sustainable Smart Factory Competition Briefing
Made Smarter Innovation: Sustainable Smart Factory Competition Briefing
KTN
 
Driving the Electric Revolution – PEMD Skills Hub
Driving the Electric Revolution – PEMD Skills HubDriving the Electric Revolution – PEMD Skills Hub
Driving the Electric Revolution – PEMD Skills Hub
KTN
 
Medicines Manufacturing Challenge EDI Survey Briefing Webinar
Medicines Manufacturing Challenge EDI Survey Briefing WebinarMedicines Manufacturing Challenge EDI Survey Briefing Webinar
Medicines Manufacturing Challenge EDI Survey Briefing Webinar
KTN
 

More from KTN (20)

Competition Briefing - Open Digital Solutions for Net Zero Energy
Competition Briefing - Open Digital Solutions for Net Zero Energy Competition Briefing - Open Digital Solutions for Net Zero Energy
Competition Briefing - Open Digital Solutions for Net Zero Energy
 
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
 
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
 
UK Catalysis: Innovation opportunities for an enabling technology
UK Catalysis: Innovation opportunities for an enabling technologyUK Catalysis: Innovation opportunities for an enabling technology
UK Catalysis: Innovation opportunities for an enabling technology
 
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
Smart Networks and Services Joint Undertaking (SNS JU) Call Topics
Smart Networks and Services Joint Undertaking (SNS JU) Call TopicsSmart Networks and Services Joint Undertaking (SNS JU) Call Topics
Smart Networks and Services Joint Undertaking (SNS JU) Call Topics
 
Building Talent for the Future 2 – Expression of Interest Briefing
Building Talent for the Future 2 – Expression of Interest BriefingBuilding Talent for the Future 2 – Expression of Interest Briefing
Building Talent for the Future 2 – Expression of Interest Briefing
 
Connected and Autonomous Vehicles Cohort Workshop
Connected and Autonomous Vehicles Cohort WorkshopConnected and Autonomous Vehicles Cohort Workshop
Connected and Autonomous Vehicles Cohort Workshop
 
Biodiversity and Food Production: The Future of the British Landscape
Biodiversity and Food Production: The Future of the British LandscapeBiodiversity and Food Production: The Future of the British Landscape
Biodiversity and Food Production: The Future of the British Landscape
 
Engage with...Performance Projects
Engage with...Performance ProjectsEngage with...Performance Projects
Engage with...Performance Projects
 
How to Create a Good Horizon Europe Proposal Webinar
How to Create a Good Horizon Europe Proposal WebinarHow to Create a Good Horizon Europe Proposal Webinar
How to Create a Good Horizon Europe Proposal Webinar
 
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
 
Engage with...Custom Interconnect
Engage with...Custom InterconnectEngage with...Custom Interconnect
Engage with...Custom Interconnect
 
Engage with...ZF
Engage with...ZFEngage with...ZF
Engage with...ZF
 
Engage with...FluxSys
Engage with...FluxSysEngage with...FluxSys
Engage with...FluxSys
 
Made Smarter Innovation: Sustainable Smart Factory Competition Briefing
Made Smarter Innovation: Sustainable Smart Factory Competition BriefingMade Smarter Innovation: Sustainable Smart Factory Competition Briefing
Made Smarter Innovation: Sustainable Smart Factory Competition Briefing
 
Driving the Electric Revolution – PEMD Skills Hub
Driving the Electric Revolution – PEMD Skills HubDriving the Electric Revolution – PEMD Skills Hub
Driving the Electric Revolution – PEMD Skills Hub
 
Medicines Manufacturing Challenge EDI Survey Briefing Webinar
Medicines Manufacturing Challenge EDI Survey Briefing WebinarMedicines Manufacturing Challenge EDI Survey Briefing Webinar
Medicines Manufacturing Challenge EDI Survey Briefing Webinar
 

Recently uploaded

一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
h7j5io0
 
Moldes de letra 3D Alfabeto completo esp
Moldes de letra 3D Alfabeto completo espMoldes de letra 3D Alfabeto completo esp
Moldes de letra 3D Alfabeto completo esp
Hess9
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
Knight Moves
 
Design-Thinking-eBook for Public Service Delivery
Design-Thinking-eBook for Public Service DeliveryDesign-Thinking-eBook for Public Service Delivery
Design-Thinking-eBook for Public Service Delivery
farhanaslam79
 
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
9a93xvy
 
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
708pb191
 
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
jyz59f4j
 
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
smpc3nvg
 
Borys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior designBorys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior design
boryssutkowski
 
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
h7j5io0
 
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
gpffo76j
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
7sd8fier
 
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
ameli25062005
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
kecekev
 
Book Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for DesignersBook Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for Designers
Confidence Ago
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
7sd8fier
 
一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理
peuce
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
n0tivyq
 

Recently uploaded (20)

一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
 
Moldes de letra 3D Alfabeto completo esp
Moldes de letra 3D Alfabeto completo espMoldes de letra 3D Alfabeto completo esp
Moldes de letra 3D Alfabeto completo esp
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
 
Design-Thinking-eBook for Public Service Delivery
Design-Thinking-eBook for Public Service DeliveryDesign-Thinking-eBook for Public Service Delivery
Design-Thinking-eBook for Public Service Delivery
 
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
 
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
 
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
 
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
 
Borys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior designBorys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior design
 
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
 
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
 
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
 
Book Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for DesignersBook Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for Designers
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
 
一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
 

Digital Security by Design: ISCF Digital Security by Design Research Projects - Natasha Richardson

  • 1. Digital Security by Design EPSRC Call for Proposals: ISCF Digital Security by Design Research Projects Opening date: 26 September 2019 Closing date: 07 January 2020 Panel meeting: April 2020 Grants start date: June 2020
  • 2. • Leveraging the Capability Hardware concepts and approaches investigated by the CHERI program (led by the University of Cambridge), a consortium led by Arm is investigating a prototype silicon-based solution based on Arm AArch64 architecture. • This prototype solution will be made openly available to academics and businesses across the UK, so as to provide early access, evaluation, and the opportunity to feed back on the proposed major change to the instruction set architecture of a processor, while investigating the broader impact to various aspects of computer science and ICT in general. Background
  • 3. Challenge Activities Technology Platform Prototype: deliver a proven secure-by-default hardware evaluation board and system software Collaborative R&D to enable market use: tooling and processes to utilise the new security capabilities; community engagement Business-led demonstrators: sector- specific adoptions e.g. IoT, connected vehicles, AI, and/or financial services to show-case real-world impact and move the accepted norm £9m£49.8m £11.2m 1. Enable 2. Use 3. Impact
  • 4. • The University of Cambridge have published a descriptive article: ‘Introduction to CHERI’ – available at https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/dsbd.html. • (Link is accessible from the EPSRC Call webpage and the Call document) Capability Hardware: CHERI
  • 5. • Up to £8M (at 80% FEC) available to support academic research projects across all three of the objectives within the scope of the Call • Timeline: Opening date: 26 September 2019 Workshop/webinar: November 2019 Closing date: 07 January 2020 Panel meeting: April 2020 Grants start date: 1 June 2020 EPSRC Call for Proposals
  • 6. Activity 1.1: • Delivering a devboard through a direct grant to a business-led consortium. The results will be openly available. Activity 1.2: • Academic-led white-hat testing and proof of platform/architecture Activity 1.3b: • Academic-led projects to broaden the system software and approaches enabled by the new platform Activity 1.4: • Academic research into the longer term impacts and consequences of the resulting changes Challenge activities relevant to the Call
  • 7. Objective 1: • Capability enabled hardware proof and software verification Objective 2: • Impact on system software and libraries Objective 3: • Future implications of Capability Hardware Call Objectives
  • 8. • Despite the historical best efforts of hardware to execute software as expected by software, it became impossible to reason on its completeness given the lack of formal specification of the hardware architecture and the complexity of any specific design. • Various advances are being made with respect to the formal proof of hardware resulting in the increasing accuracy and formal specification of the hardware architecture. However, linking the work of hardware proof with software reasoning and verification in the context of Capability Hardware needs significant research to find a methodology by which the final intent of an application can be understood and verified, including side- channel effect in the hardware, and the limited specification for data encapsulation and privilege in software. Objective 1: Capability enabled hardware and software verification
  • 9. • Through the introduction of Capability enabled Hardware, what tools or techniques can be applied in limiting and/or identifying leakage of information, including but not limited to, containment analysis and various forms of information flow within software? • Can (and if so, how can) the formal specifications of hardware be extended to include microarchitectural artefacts beyond the architectural specification often responsible for side-channel or inference-based information leakage? • How can a system dynamically learn and monitor the correct operation of a platform’s intent, to provide necessary information to mitigate inappropriate operations potentially identified as a divergence from a runtime specification or a learning associated with historic operation? • Given a formal executable hardware architectural specification, how can we increase the capabilities and understanding of formal method and proof with respect to the expected execution of software, its proof and verification? Objective 1: Example research questions
  • 10. • There are various implications and potential solutions to extending current software and “end-2-end” security schemes to include the movement of data with fine grain protection and inherited rights. For example, how to extend cryptography frameworks to extend the protection of information from the point of encryption to the point of use in an application, through the application of Capability Hardware. • Existing platforms support various software and hardware assisted mechanisms to encapsulate the various states of an application as an aid towards increasing security or limiting visibility of data. Whether this is through a managed runtime, a trusted execution engine, the interpretation and translation of binaries, or larger grain hardware protection schemes, the introduction of fine grain data containerisation and access privilege will bring new opportunities and new threats. Investigations are required to understand these implications and to propose how existing system software and libraries will adapt to such new hardware mechanisms. Objective 2: Impact on system software and libraries
  • 11. • How can existing managed runtimes, high-level languages or systems leveraging binary translation of code benefit from the introduction of Capability enabled Hardware and improve the security of applications and services? • What are the impacts and opportunities from Capability Hardware to increase the security between and within platforms, using a trusted execution engine (TEE) or other virtualization technologies? How will the delivery or use of such technologies change? • How can the increased security provided by Capability Hardware be extended robustly to operate security over a distributed system? Objective 2: Example research questions
  • 12. • When virtual memory was first introduced, the ways in which this coarse grain memory partitioning and access privilege would be used was unknown. Although various characteristics of how virtual memory is managed by a processor has evolved, the fundamental concepts remain unchanged. • Given the wider challenge objective to introduce fine grain compartmentalisation and inherited privilege capabilities to a processor, the future implications and potential use cases are unknown. The aim of this objective is to fund early stage research into the longer term implications of the new memory projection paradigm. Objective 3: Future implications of Capability Hardware
  • 13. • Today’s operating systems use virtual memory for the protection of code and data, process isolation and the associated scheduling mechanisms. Since a Capability enabled processor offers stronger and more fine grained protection than current systems, what might the implications and opportunities be when reconsidering these requirements of an operating system? • What are the implications and opportunities of Capability Hardware existing in the central processing unit (CPU) on other hardware devices such as direct memory access (DMA) devices and processors of a digital system and their associated software stacks? Objective 3: Example research questions
  • 14. • Applicants invited to submit proposals that meet one of the three objectives within the Call • Eligibility: any single investigator can only apply once, as either a PI or Co-I • Postal peer review followed by prioritisation panel (if reviews are sufficiently supportive) • Portfolio approach will be taken to final funding decisions to ensure coverage across, and within, the three objectives Call structure and format
  • 15. • Event before the Call closes - to allow for further discussion between potential applicants/collaborators, and with the CHERI investigators and Arm representatives • Format tbc – face to face workshop or webinar • To be held November 2019 Workshop / webinar