Security improvement in embedded systems via an efficient hardware bound checking architecture

被引:1
|
作者
Grasser, Michael Georg [1 ]
机构
[1] Graz Univ Technol, Inst Tech Informat, Graz, Austria
关键词
Computer hardware; Data security; Digital storage;
D O I
10.1108/17440080710829270
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - Embedded technologies are one of the fastest growing sectors in information technology today and they are still open fields with many business opportunities. Hardly any new product reaches the market without embedded systems components any more. However, the main technical challenges include the design and integration, as well as providing the necessary degree of security in an embedded system. This paper aims to focus on a new processor architecture introduced to face security issues. Design/methodology/approach - In the short term, the main idea of this paper focuses on the implementation of a method for the improvement of code security through measurements in hardware that can be transparent to software developers. It was decided to develop a processor core extension that provides an improved capability against software vulnerabilities and improves the security of target systems passively. The architecture directly executes bound checking in hardware without performance loss, whereas checking in software would make any application intolerably slow. Findings - Simulation results demonstrated that the proposed design offers a higher performance and security, when compared with other solutions. For the implementation of the Secure CPU, the SPARC V8-based LEON 2 processor from Gaisler Research was used. The processor core was adapted and finally synthesised for a GR-XC3S-1500 board and extended. Originality/value - As numerically, most systems run on dedicated hardware and not on high-performance general purpose processors. There certainly exists a market even for new hardware to be used in real applications. Thus, the experience from the related project work can lead to valuable and marketable results for businesses and academics.
引用
收藏
页码:153 / +
页数:21
相关论文
共 50 条
  • [1] Efficient Hardware Architecture for Embedded Radionuclide Identification
    Farias, Marcos Santana
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    [J]. 2013 IEEE 4TH LATIN AMERICAN SYMPOSIUM ON CIRCUITS AND SYSTEMS (LASCAS), 2013,
  • [2] Efficient array & pointer bound checking against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 780 - 785
  • [3] Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Qiu, MK
    Xiao, B
    Sha, EHM
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (04) : 443 - 453
  • [4] An Open Architecture for Embedded Systems: Hardware Open Systems Technologies
    Benjamin, William
    Kromer, Eric
    Schnelle, Christopher
    [J]. SOUTHEASTCON 2017, 2017,
  • [5] Hardware Virtualization Based Security Solution for Embedded Systems
    Lukacs, Sandor
    Lutas, Andrei V.
    Lutas, Dan H.
    Sebestyen, Gheorghe
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, 2014,
  • [6] Bifrost: Visualizing and Checking Behavior of Embedded Systems across Hardware and Software
    McGrath, Will
    Drew, Daniel
    Warner, Jeremy
    Kazemitabaar, Majeed
    Karchemsky, Mitchell
    Mellis, David
    Hartmann, Bjoern
    [J]. UIST'17: PROCEEDINGS OF THE 30TH ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY, 2017, : 299 - 310
  • [7] A Security Architecture for Reconfigurable Networked Embedded Systems
    Dini, Gianluca
    Savino, Ida
    [J]. INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2010, 17 (1-2) : 11 - 25
  • [8] A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
    Hao, Qiang
    Zhang, Zhun
    Xu, Dongdong
    Wang, Jiqing
    Liu, Jiakang
    Zhang, Jinlei
    Ma, Jinhui
    Wang, Xiang
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [9] Efficient and lightweight in-memory computing architecture for hardware security
    Ajmi, Hala
    Zayer, Fakhreddine
    Fredj, Amira Hadj
    Belgacem, Hamdi
    Mohammad, Baker
    Werghi, Naoufel
    Dias, Jorge
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 190
  • [10] Efficient Hardware/Software partitioning for Heterogeneous Embedded Systems
    Manor, Erez
    Greenberg, Shlomo
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON THE SCIENCE OF ELECTRICAL ENGINEERING IN ISRAEL (ICSEE), 2018,