A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems

被引:0
|
作者
Wang, Xiang [1 ]
Wang, Weike [1 ]
Xu, Bin [1 ]
Du, Pei [1 ]
Li, Lin [1 ]
Liu, Muyang [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Instrument Sci & Optoelect Engn, Beijing 100191, Peoples R China
基金
美国国家科学基金会;
关键词
embedded system; basic block; runtime security; code integrity; hardware-based security; EXECUTION; DESIGN; DETECT;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Embedded systems are subjected to various adversaries including software attacks, physical attacks, and side channel attacks. Most of these malicious attacks can lead to the invalid execution of programs, and launch of destructive actions or reveal critical information. However, most previous security mechanisms suffer from coarse checking granularity and unacceptable performance overhead, due to strict restriction on system resources. This paper presents a fine-grained hardware-based security approach to ensure runtime code integrity in the embedded systems by offline profiling of the program features and runtime integrity check. We design a hardware implemented instruction stream integrity checker (ISIC) to perform runtime checking of pre-extracted features. Any invalid execution of the program will trigger the corresponding exception signal. We implement the ISIC with OR1200 processor on XC5VLX50T field-programmable gate array (FPGA). The experimental results show that the proposed approach can detect all the attacks destructing integrity of the instruction stream, and the performance overhead induced by the security mechanism is less than 3.45% according to the selected benchmarks.
引用
收藏
页码:515 / 536
页数:22
相关论文
共 50 条
  • [31] COMPILER/HARDWARE ASSISTED APPLICATION CODE AND DATA SECURITY IN EMBEDDED SYSTEMS
    Bu, Chunguang
    Wang, Xiang
    Zhang, Chi
    Liu, Jizhong
    Wang, Xiaodong
    Qi, Chuntang
    Gao, Xiaoying
    Li, Baosen
    [J]. 2009 IEEE/AIAA 28TH DIGITAL AVIONICS SYSTEMS CONFERENCE, VOLS 1-3, 2009, : 1757 - +
  • [32] Machine Learning for Fine-Grained Hardware Prefetcher Control
    Hiebel, Jason
    Brown, Laura E.
    Wang, Zhenlin
    [J]. PROCEEDINGS OF THE 48TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP 2019), 2019,
  • [33] vScope: A Fine-Grained Approach to Schedule vCPUs in NUMA Systems
    Gan, Qingtian
    Wu, Song
    Jin, Hai
    Wang, Kun
    [J]. 2017 19TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS (HPCC) / 2017 15TH IEEE INTERNATIONAL CONFERENCE ON SMART CITY (SMARTCITY) / 2017 3RD IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (DSS), 2017, : 531 - 538
  • [34] Legba: Fast hardware support for fine-grained protection
    Wiggins, A
    Winwood, S
    Tuch, H
    Heiser, G
    [J]. ADVANCES IN COMPUTER SYSTEMS ARCHITECTURE, 2003, 2823 : 320 - 336
  • [35] FINE-GRAINED META-THEOREMS FOR VERTEX INTEGRITY
    Lampis, Michael
    Mitsou, Valia
    [J]. Logical Methods in Computer Science, 2024, 20 (04): : 1 - 18
  • [36] DarkMem: Fine-Grained Power Management of Local Memories for Accelerators in Embedded Systems
    Pilato, Christian
    Carloni, Luca P.
    [J]. 2018 23RD ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2018, : 696 - 701
  • [37] Security Mapping to Enhance Matching Fine-Grained Security Policies
    Ben Brahim, Monia
    Ben Jemaa, Maher
    Jmaiel, Mohamed
    [J]. NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 183 - 196
  • [38] Cloud Computing Security: Fine-grained analysis and Security approaches
    Alfath, Abdeladim
    Baina, Karim
    Baina, Salah
    [J]. 2013 NATIONAL SECURITY DAYS (JNS3), 2013,
  • [39] TMDFI: Tagged Memory Assisted for Fine-grained Data-Flow Integrity towards Embedded Systems against Software Exploitation
    Liu, Tong
    Shi, Gang
    Chen, Liwei
    Zhang, Fei
    Yang, Yaxuan
    Zhang, Jihu
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 545 - 550
  • [40] ACTION AND CRIME - A FINE-GRAINED APPROACH
    GOLDMAN, AI
    [J]. UNIVERSITY OF PENNSYLVANIA LAW REVIEW, 1994, 142 (05) : 1563 - 1586