The Design and Implementation of Embedded Security CPU Based on Multi-strategy

被引:3
|
作者
Li Dongfang [1 ,2 ]
Zhan Xin [1 ,3 ]
Tong Qiaoling [1 ]
Zou Xuecheng [1 ]
Liu Zhenglin [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Opt & Elect Informat, Wuhan 430074, Peoples R China
[2] Beijing Inst Comp Technol & Applicat, Beijing 100854, Peoples R China
[3] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
基金
中国国家自然科学基金;
关键词
Information flow security; Taint tracking; Memory monitor module; Embedded processor architecture;
D O I
10.1049/cje.2016.08.040
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Control flow monitoring, information flow tracking and memory monitoring are the three main solutions to enhance the security of embedded system at the hardware architecture level. However, most of the current studies about the security of embedded system consider the above solutions in separate dimensions rather than a combined effort. We start from the operation model at the instruction level, and propose a security multi-strategy which combines information flow tracking and memory monitoring by studying the security operating mechanism of embedded system. As a hardware approach this strategy extends the embedded processor architecture with additional security defense control. The experimental results show this multi-strategy is more effective and can detect more malicious attacks than a single solution. The effectiveness of our proposed security multi-strategy has been verified in a Field programmable gate array (FPGA) prototype platform based on a customized Leon3 microprocessor.
引用
收藏
页码:801 / 806
页数:6
相关论文
共 50 条
  • [1] The Design and Implementation of Embedded Security CPU Based on Multi-strategy
    LI Dongfang
    ZHAN Xin
    TONG Qiaoling
    ZOU Xuecheng
    LIU Zhenglin
    [J]. Chinese Journal of Electronics, 2016, 25 (05) : 801 - 806
  • [2] Design and Implementation of Reactor Temperature Controller Based on Partitioning Multi-strategy
    Du, Qingfu
    Qiao, Lijuan
    Xue, Yuan
    Cheng, Yun
    Sun, Guofang
    [J]. 2014 11TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2014, : 4344 - 4349
  • [3] Assessment of a multi-strategy classifier for an embedded software system
    Khoshgoftaar, Taghi M.
    Gao, Kehan
    [J]. ICTAI-2006: EIGHTEENTH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, : 651 - +
  • [4] Implementation of multi-strategy programs: a proposal for an evaluation matrix
    Magalhaes, Rosana
    [J]. CIENCIA & SAUDE COLETIVA, 2014, 19 (07): : 2115 - 2123
  • [5] Optimal design of DNA coding based on multi-strategy JAYA algorithm
    Wang, Siwei
    Zhu, Donglin
    Wang, Xiao
    [J]. 2023 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE, ICACI, 2023,
  • [6] A Multi-Strategy QA Method Combining with Embedded User Feedback
    Hu, Yuwei
    Zheng, Xueyuan
    Zong, Ping
    [J]. 2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BIG DATA, ICAIBD 2024, 2024, : 150 - 155
  • [7] Information security strategies: towards an organizational multi-strategy perspective
    Ahmad, Atif
    Maynard, Sean B.
    Park, Sangseo
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 357 - 370
  • [8] Information security strategies: towards an organizational multi-strategy perspective
    Atif Ahmad
    Sean B. Maynard
    Sangseo Park
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 357 - 370
  • [9] MULTI-STRATEGY BUILDINGS
    WEEKS, J
    [J]. EKISTICS, 1971, 31 (186): : 367 - 371
  • [10] Multi-strategy Based Matching Technique for Ontology Integration
    Kumar, S.
    Singh, V.
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 3, 2015, 33