Technology - Enhanced Central processing unit (CPU) architecture with hardware tags blocks security attacks with no overhead

Enhanced Central processing unit (CPU) architecture with hardware tags blocks security attacks with no overhead

This invention introduces a secure CPU architecture that embeds fine-grained hardware tags directly into instructions and data, enabling real-time enforcement of control-flow and pointer integrity. By validating operations at execution time, it blocks hijacks and memory errors with minimal performance overhead, delivering practical, built-in protection against modern software exploits.

Background:

Modern systems remain exposed to control-flow attacks such as Jump-Oriented Programming (JOP) and Return-Oriented Programming (ROP), as well as memory corruption vulnerabilities. Software defenses are often coarse-grained or computationally expensive, while existing hardware protections cover only limited classes of bugs. Enforcing context-aware policies at instruction granularity typically requires intrusive compiler or OS modifications, external metadata, or high runtime overhead, which complicates deployment and slows real workloads.

Technology Overview:

This CPU architecture integrates immutable tags for both instructions and data in registers and memory. During execution, hardware continuously compares these tags—along with explicit control-flow labels—to determine whether to permit or deny operations such as calls, returns, indirect jumps, and memory accesses. Tags can reside inline in binaries, in the instruction cache, or in protected memory. A modified compiler and operating system toolchain (e.g., LLVM with kernel extensions) automatically generates and manages tags. A reference implementation, STAR, demonstrates strong control-flow integrity and pointer validation with only a few percent performance overhead on FPGA prototypes, proving practical, fine-grained enforcement with negligible cost.

Advantages:


• Per-instruction, fine-grained enforcement that blocks ROP/JOP and bad pointer use
• Inline tag placement for fast lookup and cache locality
• Low measured overhead (~few percent on FPGA prototypes) suitable for production use
• Flexible tag storage options compatible with multiple instruction set architectures
• Hardware–software co-design with compiler/OS support for seamless integration
• Policy composability enabling simultaneous enforcement of access control, compartmentalization, and CFI

Applications:


• Cloud servers and confidential computing hosts requiring tenant isolation
• Safety-critical embedded controllers in automotive, aerospace, and industrial systems
• Secure IoT and edge devices with tight performance and power constraints
• Enterprise endpoints and hardened desktop/laptop systems needing robust CFI
• Defense and government high-assurance computing platforms

Intellectual Property Summary:


• United States – 63/650,898, Provisional, filed 05/22/2024, Converted
• United States – 19/216,713, Utility, filed 05/23/2025, Status: Filed

Stage of Development:

Prototype.

Licensing Status:

This technology is available for licensing.

Licensing Potential:

Ideal for processor manufacturers, embedded system designers, and cybersecurity solution providers seeking scalable, low-overhead hardware protection against control-flow and memory integrity attacks.

Additional Information:

FPGA prototype performance metrics and hardware-software integration details available upon request.

Patent Information: