skip to main content
10.1145/1278480.1278605acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
Article

Hardware support for secure processing in embedded systems

Published: 04 June 2007 Publication History

Abstract

The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor and detects any attack that causes the embedded processor to deviate from its originally programmed behavior. We explore several different characteristics that can be used for monitoring and quantitative tradeoffs between these approaches. Our results show that our proposed hash-based monitoring pattern can detect attacks within one instruction cycle at lower memory requirements than traditional approaches that use control-flow information.

References

[1]
Abadi, M., Budiu, M., Erlingsson, Ú., and Ligatti, J. Control-Flow Integrity Principles, Implementations, and Applications. In ACM Conference on Computer and Communication Security (CCS) (Alexandria, VA, Nov. 2005), pp. 340--353.
[2]
Arora, D., Ravi, S., Raghunathan, A., and Jha, N. K. Secure embedded processing through hardware-assisted run-time monitoring. In Proc. of the Design, Automation and Test in Europe Conference and Exhibition (DATE'05) (Munich, Germany, Mar. 2005), pp. 178--183.
[3]
Burger, D., and Austin, T. M. The SimpleScalar tool set, version 2.0. Tech. Rep. 1342, Department of Computer Science, University of Wisconsin in Madison, June 1997.
[4]
Chari, S., Jutla, C. S., Rao, J. R., and Rohatgi, P. Towards sound approaches to counteract power-analysis attacks. In Proc of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '99) (London, United Kingdom, 1999), vol. 1666 of Lecture Notes in Computer Science, Springer-Verlag, pp. 398--412.
[5]
Cretu, G. P., Parekh, J. J., Wang, K., and Stolfo, S. J. Intrusion and anomaly detection model exchange for mobile ad-hoc networks. In Proc of 3rd IEEE on Consumer Communications and Networking Conference (CCNC 2006) (Las Vegas, NV, Jan. 2006), pp. 635--639.
[6]
Gogniat, G., Wolf, T., and Burleson, W. Reconfigurable security primitive for embedded systems. In Proc. of International Symposium on System-on-Chip (SOC) (Tampere, Finland, Nov. 2005).
[7]
Guthaus, M. R., Ringenberg, J. S., Ernst, D., Austin, T. M., Mudge, T., and Brown, R. B. MiBench: A free, commercially representative embedded benchmark suite. In Proc. of IEEE 4th Annual Workshop on Workload Characterization (Austin, TX, Dec. 2001).
[8]
Kocher, P., Jaffe, J., and Jun, B. Differential power analysis. In Proc of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '99) (London, United Kingdom, 1999), vol. 1666 of Lecture Notes in Computer Science, Springer-Verlag, pp. 388--397.
[9]
Ravi, S., Raghunathan, A., and Chakradhar, S. Tamper resistance mechanisms for secure, embedded systems. In Proc. of 17th International Conference on VLSI Design (VLSI Design 2004) (Mumbai, India, Jan. 2004), pp. 605--611.
[10]
Suh, G. E., Lee, J. W., Zhang, D., and Devadas, S. Secure program execution via dynamic information flow tracking. In ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems (Boston, MA, Oct. 2004), pp. 85--96.
[11]
Wood, A., and Stankovic, J. A. Denial of service in sensor networks. IEEE Computer 35, 10 (Oct. 2002), 54--62.

Cited By

View all
  • (2023)Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use CaseElectronics10.3390/electronics1213298712:13(2987)Online publication date: 7-Jul-2023
  • (2021)FastCFI: Real-time Control-Flow Integrity Using FPGA without Code InstrumentationACM Transactions on Design Automation of Electronic Systems10.1145/345847126:5(1-39)Online publication date: 5-Jun-2021
  • (2019)Securing IoT Protocol Implementations Through Hardware Monitoring2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)10.1109/MASS.2019.00061(467-475)Online publication date: Nov-2019
  • Show More Cited By

Index Terms

  1. Hardware support for secure processing in embedded systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DAC '07: Proceedings of the 44th annual Design Automation Conference
      June 2007
      1016 pages
      ISBN:9781595936271
      DOI:10.1145/1278480
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 June 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. embedded system security
      2. hardware monitor
      3. processing monitor

      Qualifiers

      • Article

      Conference

      DAC07
      Sponsor:

      Acceptance Rates

      DAC '07 Paper Acceptance Rate 152 of 659 submissions, 23%;
      Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

      Upcoming Conference

      DAC '25
      62nd ACM/IEEE Design Automation Conference
      June 22 - 26, 2025
      San Francisco , CA , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 07 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use CaseElectronics10.3390/electronics1213298712:13(2987)Online publication date: 7-Jul-2023
      • (2021)FastCFI: Real-time Control-Flow Integrity Using FPGA without Code InstrumentationACM Transactions on Design Automation of Electronic Systems10.1145/345847126:5(1-39)Online publication date: 5-Jun-2021
      • (2019)Securing IoT Protocol Implementations Through Hardware Monitoring2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)10.1109/MASS.2019.00061(467-475)Online publication date: Nov-2019
      • (2019)FastCFI: Real-Time Control Flow Integrity Using FPGA Without Code InstrumentationRuntime Verification10.1007/978-3-030-32079-9_13(221-238)Online publication date: 1-Oct-2019
      • (2018)Effective Control Flow Integrity Checks for Intrusion Detection2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)10.1109/IOLTS.2018.8474130(1-6)Online publication date: Jul-2018
      • (2017)EDDIEACM SIGARCH Computer Architecture News10.1145/3140659.308022345:2(333-346)Online publication date: 24-Jun-2017
      • (2017)EDDIEProceedings of the 44th Annual International Symposium on Computer Architecture10.1145/3079856.3080223(333-346)Online publication date: 24-Jun-2017
      • (2017)Hardware support for embedded operating system security2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP)10.1109/ASAP.2017.7995260(61-66)Online publication date: Jul-2017
      • (2016)Trust and reliability for next-generation routersMILCOM 2016 - 2016 IEEE Military Communications Conference10.1109/MILCOM.2016.7795417(740-745)Online publication date: Nov-2016
      • (2015)Design of an adaptive security mechanism for modern routers2015 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE.2015.7066397(241-244)Online publication date: Jan-2015
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media