RDAMS: An Efficient Run-Time Approach for Memory Fault and Hardware Trojans Detection

被引:3
|
作者
Wang, Jian [1 ,2 ,3 ]
Li, Ying [1 ,3 ]
机构
[1] Chinese Acad Sci, Inst Microelect, Beijing 100029, Peoples R China
[2] Univ Chinese Acad Sci, Sch Microelect, Beijing 100049, Peoples R China
[3] Beijing Key Lab Three Dimens & Nanometer Integrat, Beijing 100029, Peoples R China
基金
国家重点研发计划;
关键词
SoC; memory; security; detection architecture; detection mode;
D O I
10.3390/info12040169
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at runtime, it will bring huge losses. In this paper, we propose a run-time detection architecture for memory security (RDAMS) to detect memory threats (fault and Hardware Trojans attack). The architecture consists of a Security Detection Core (SDC) that controls and enforces the detection procedure as a "security brain", and a memory wrapper (MEM_wrapper) which interacts with memory to assist the detection. We also design a low latency response mechanism to solve the SoC performance degradation caused by run-time detection. A block-based multi-granularity detection approach is proposed to render the design flexible and reduce the cost in implementation using the FPGA's dynamic partial reconfigurable (DPR) technology, which enables online detection mode reconfiguration according to the requirements. Experimental results show that RDAMS can correctly detect and identify 10 modeled memory faults and two types of Hardware Trojans (HTs) attacks without leading a great performance degradation to the system.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] A run-time partitioning algorithm for RTOS on reconfigurable hardware
    Götz, M
    Rettberg, A
    Pereira, CE
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, 2005, 3824 : 469 - 478
  • [42] A Performance Model for Run-Time Reconfigurable Hardware Accelerator
    Wang, Gang
    Chen, Du
    Chen, Jian
    Ma, Jianliang
    Chen, Tianzhou
    [J]. ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2009, 5737 : 54 - 66
  • [43] Signature-based method for run-time fault detection in communication protocols
    Noubir, G
    Vijayananda, K
    Nussbaumer, HJ
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (05) : 405 - 421
  • [44] Signature-based method for run-time fault detection in communication protocols
    CSEM SA, Neuchatel, Switzerland
    [J]. Comput Commun, 5 (405-421):
  • [45] The Importance of Run-Time Error Detection
    Luecke, Glenn R.
    Coyle, James
    Hoekstra, James
    Kraeva, Marina
    Xu, Ying
    Park, Mi-Young
    Kleiman, Elizabeth
    Weiss, Olga
    Wehe, Andre
    Yahya, Melissa
    [J]. TOOLS FOR HIGH PERFORMANCE COMPUTING 2009, 2010, : 145 - 155
  • [46] Run-time detection of covert channels
    Nagatou, Naoyuki
    Watanabe, Takuo
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 577 - +
  • [47] Efficient incremental run-time specialization for free
    Marlet, R
    Consel, C
    Boinot, P
    [J]. ACM SIGPLAN NOTICES, 1999, 34 (05) : 281 - 292
  • [48] Efficient On-line Hardware/Software Task Scheduling For Dynamic Run-time Reconfigurable Systems
    Al-Wattar, Ahmed
    Areibi, Shawki
    Saffih, Faycal
    [J]. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 401 - 406
  • [49] Combining compile-time and run-time support for efficient software distributed shared memory
    Dwarkadas, S
    Lu, HH
    Cox, AL
    Rajamony, R
    Zwaenepoel, W
    [J]. PROCEEDINGS OF THE IEEE, 1999, 87 (03) : 476 - 486
  • [50] Efficient run-time monitoring of timing constraints
    Mok, AK
    Liu, GT
    [J]. THIRD IEEE REAL-TIME TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 1997, : 252 - 262