Performance study of a compiler/hardware approach to embedded systems security

被引:0
|
作者
Mohan, K [1 ]
Narahari, B
Simha, R
Ott, P
Choudhary, A
Zambreno, J
机构
[1] George Washington Univ, Washington, DC 20052 USA
[2] Northwestern Univ, Evanston, IL 60208 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security challenges in the design of embedded systems. This short paper evaluates the performance of a hardware/software co-design methodology for embedded software protection. Secure software is created using a secure compiler that inserts hidden codes into the executable code which are then validated dynamically during execution by a reconfigurable hardware component constructed from Field Programmable Gate Array (FPGA) technology. While the overall approach has been described in other papers, this paper focuses on security-performance tradeoffs and the effect of using compiler optimizations in such an approach. Our results show that the approach provides software protection with modest performance penalty and hardware overhead.
引用
收藏
页码:543 / 548
页数:6
相关论文
共 50 条
  • [21] Secure embedded system hardware design - A flexible security and trust enhanced approach
    Fournaris, Apostolos P.
    Sklavos, Nicolas
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) : 121 - 133
  • [22] Hardware/software techniques for improving cache performance in embedded systems
    Memik, G
    Kandemir, MT
    Choudhary, A
    Kadayif, I
    [J]. EMBEDDED SOFTWARE FOR SOC, 2003, : 387 - 401
  • [23] A compiler approach to fast hardware design space exploration in FPGA-based systems
    So, B
    Hall, MW
    Diniz, PC
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (05) : 165 - 176
  • [24] Security improvement in embedded systems via an efficient hardware bound checking architecture
    Grasser, Michael Georg
    [J]. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2007, 3 (1-2) : 153 - +
  • [25] Performance Study of Bat Algorithm Running on Embedded Hardware
    Fister, Iztok Jr.
    Vrbancic, Grega
    Hozjan, Tomaz
    Fister, Iztok
    Podgorelec, Vili
    [J]. PROCEEDINGS OF THE 2019 23RD INTERNATIONAL CONFERENCE ELECTRONICS (ELECTRONICS 2019), 2019,
  • [26] Design of Networked Embedded Systems: An Approach for Safety and Security
    Sveda, Miroslav
    Trchalik, Roman
    Ocenasek, Pavel
    [J]. IFAC WORKSHOP ON PROGRAMMABLE DEVICES AND EMBEDDED SYSTEMS (PDES 2009), PROCEEDINGS, 2009, : 127 - 132
  • [27] A Novel Approach for Security and Robustness in Wireless Embedded Systems
    Husain, Mohammad Iftekhar
    Upadhyaya, Shambhu
    Chandrasekaran, Madhusudhanan
    [J]. SOFTWARE TECHNOLOGIES FOR EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2008, 5287 : 323 - 335
  • [28] Harmonizing Safety, Security and Performance Requirements in Embedded Systems
    Apvrille, Ludovic
    Li, Letitia W.
    [J]. 2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 1631 - 1636
  • [29] A hardware/software partitioning and scheduling approach for embedded systems with low-power and high performance requirements
    Resano, J
    Mozos, D
    Pérez, E
    Mecha, H
    Septién, J
    [J]. INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2003, 2799 : 580 - 589
  • [30] Multiscale approach to the security of hardware supply chains for energy systems
    Lambert J.H.
    Keisler J.M.
    Wheeler W.E.
    Collier Z.A.
    Linkov I.
    [J]. Environment Systems and Decisions, 2013, 33 (3) : 326 - 334