Abstract
Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security challenges in the design of embedded systems. This short paper evaluates the performance of a hardware/software co-design methodology for embedded software protection. Secure software is created using a secure compiler that inserts hidden codes into the executable code which are then validated dynamically during execution by a reconfigurable hardware component constructed from Field Programmable Gate Array (FPGA) technology. While the overall approach has been described in other papers, this paper focuses on security-performance tradeoffs and the effect of using compiler optimizations in such an approach. Our results show that the approach provides software protection with modest performance penalty and hardware overhead.
This work is supported in part by Grant CCR 0325207 from the National Science Foundation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zambreno, J., Choudhary, A., Simha, R., Narahari, B., Memon, A.: SAFE-OPS: A Compiler/ Architecture Approach to Embedded Software Security. ACM Transactions on Embedded Computing
Chang, H., Atallah, M.: Protecting software code by guards. In: Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management, pp. 160–175 (2000)
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Dept of Computer Science, University of Auckland. Tech. Rep. 148 (1997)
Daeman, J., Rijmen, V.: The block cipher Rijndael. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol. 1820, pp. 288–296. Springer, Heidelberg (2000)
Dallas Semiconductor: Features, advantages, and benefits of button-based security, available at http://www.ibutton.com
Gobioff, H., Smith, S., Tygar, D., Yee, B.: Smart cards in hostile environments. In: Proceedings of 2nd USENIX Workshop on Electronic Commerce, pp. 23–28 (1996)
Necula, G.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languagers, pp. 106–119 (1997)
Austin, T., Larson, E., Ernst, D.: SimpleScalar: An Infrastructure for Computer System Modeling. IEEE Computer (February 2002)
Simha, R., Narahari, B., Choudhary, A., Zambreno, J.: An overview of security-driven compilation. In: Workshop on New Horizons in Compiler Analysis and Optimizations, Bangalore, India (December 2004)
Wurster, G., Oorschot, P., Somayaji, A.: A generic attack on checksumming-based software tamper resistance. In: IEEE Symp. Security and Privacy, Oakland, CA (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mohan, K., Narahari, B., Simha, R., Ott, P., Choudhary, A., Zambreno, J. (2005). Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_56
Download citation
DOI: https://doi.org/10.1007/11427995_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)