Hardware-Based Run-Time Code Integrity in Embedded Devices

被引:7
|
作者
Wehbe, Taimour [1 ]
Mooney, Vincent [1 ,2 ]
Keezer, David [1 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
关键词
embedded systems security; hardware-based malware detection; run-time monitoring; code modification; security threats; Field Programmable Gate Arrays (FPGA);
D O I
10.3390/cryptography2030020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively increasing plethora of software vulnerabilities. One of the most dangerous types of these attacks targets application code at run-time. Techniques to detect such attacks typically rely on software due to the ease of implementation and integration. However, these techniques are still vulnerable to the same attacks due to their software nature. In this work, we present a novel hardware-assisted run-time code integrity checking technique where we aim to detect if executable code resident in memory is modified at run-time by an adversary. Specifically, a hardware monitor is designed and attached to the device's main memory system. The monitor creates page-based signatures (hashes) of the code running on the system at compile-time and stores them in a secure database. It then checks for the integrity of the code pages at run-time by regenerating the page-based hashes (with data segments zeroed out) and comparing them to the legitimate hashes. The goal is for any modification to the binary of a user-level or kernel-level process that is resident in memory to cause a comparison failure and lead to a kernel interrupt which allows the affected application to halt safely.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [41] Secure content distribution system based on run-time partial hardware reconfiguration
    Hori, Yohei
    Yokoyama, Hiroyuki
    Toda, Kenji
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 637 - 640
  • [42] Run-time code generation and Modal-ML
    Wickline, P
    Lee, P
    Pfenning, F
    ACM SIGPLAN NOTICES, 1998, 33 (05) : 224 - 235
  • [43] Run-time code generation as a central system service
    Franz, M
    SIXTH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, PROCEEDINGS, 1997, : 112 - 117
  • [44] Run-Time ROP Attack Detection on Embedded Devices Using Side Channel Power Analysis
    Xu, Jinyao
    Abraham, Danny
    Harris, Ian G.
    IEEE Embedded Systems Letters, 2024, 16 (04) : 377 - 380
  • [45] Run-Time Reconfiguration of Expandable Cache for Embedded Systems
    Hsieh, Ang-Chih
    Hwang, TingTing
    2010 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AUTOMATION AND TEST (VLSI-DAT), 2010, : 207 - 210
  • [46] Run-Time Reconfiguration of Expandable Cache for Embedded Systems
    Hsieh, Ang-Chih
    Hwang, Ting Ting
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (10) : 1863 - 1875
  • [47] RISPP: A RUN-TIME ADAPTIVE RECONFIGURABLE EMBEDDED PROCESSOR
    Bauer, Lars
    Shafique, Muhammad
    Henkel, Joerg
    FPL: 2009 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2009, : 725 - +
  • [48] Basic Block Encoding Based Run-time CFI Check for Embedded Software
    University of South Florida, Department of Computer Science and Engineering, Tampa
    FL
    33620, United States
    IEEE/IFIP Int. Conf. VLSI Syst.-on-Chip, VLSI-SoC, 2020, (135-140): : 135 - 140
  • [49] A TrustEnclave-Based Architecture for Ensuring Run-Time Security in Embedded Terminals
    Chang, Rui
    Jiang, Liehui
    Chen, Wenzhi
    Xie, Yaobin
    Lu, Zhongyong
    TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 22 (05) : 447 - 457
  • [50] Pareto-optimization-based run-time task scheduling for embedded systems
    Yang, P
    Catthoor, F
    CODES(PLUS)ISSS 2003: FIRST IEEE/ACM/IFIP INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN & SYSTEM SYNTHESIS, 2003, : 120 - 125