Skip to main content

Performance Study of a Compiler/Hardware Approach to Embedded Systems Security

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

Abstract

Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security challenges in the design of embedded systems. This short paper evaluates the performance of a hardware/software co-design methodology for embedded software protection. Secure software is created using a secure compiler that inserts hidden codes into the executable code which are then validated dynamically during execution by a reconfigurable hardware component constructed from Field Programmable Gate Array (FPGA) technology. While the overall approach has been described in other papers, this paper focuses on security-performance tradeoffs and the effect of using compiler optimizations in such an approach. Our results show that the approach provides software protection with modest performance penalty and hardware overhead.

This work is supported in part by Grant CCR 0325207 from the National Science Foundation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zambreno, J., Choudhary, A., Simha, R., Narahari, B., Memon, A.: SAFE-OPS: A Compiler/ Architecture Approach to Embedded Software Security. ACM Transactions on Embedded Computing

    Google Scholar 

  2. Chang, H., Atallah, M.: Protecting software code by guards. In: Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management, pp. 160–175 (2000)

    Google Scholar 

  3. Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Dept of Computer Science, University of Auckland. Tech. Rep. 148 (1997)

    Google Scholar 

  4. Daeman, J., Rijmen, V.: The block cipher Rijndael. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol. 1820, pp. 288–296. Springer, Heidelberg (2000)

    Google Scholar 

  5. Dallas Semiconductor: Features, advantages, and benefits of button-based security, available at http://www.ibutton.com

  6. Gobioff, H., Smith, S., Tygar, D., Yee, B.: Smart cards in hostile environments. In: Proceedings of 2nd USENIX Workshop on Electronic Commerce, pp. 23–28 (1996)

    Google Scholar 

  7. Necula, G.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languagers, pp. 106–119 (1997)

    Google Scholar 

  8. Austin, T., Larson, E., Ernst, D.: SimpleScalar: An Infrastructure for Computer System Modeling. IEEE Computer (February 2002)

    Google Scholar 

  9. Simha, R., Narahari, B., Choudhary, A., Zambreno, J.: An overview of security-driven compilation. In: Workshop on New Horizons in Compiler Analysis and Optimizations, Bangalore, India (December 2004)

    Google Scholar 

  10. Wurster, G., Oorschot, P., Somayaji, A.: A generic attack on checksumming-based software tamper resistance. In: IEEE Symp. Security and Privacy, Oakland, CA (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mohan, K., Narahari, B., Simha, R., Ott, P., Choudhary, A., Zambreno, J. (2005). Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_56

Download citation

  • DOI: https://doi.org/10.1007/11427995_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics