Ensuring Secure Program Execution in Multiprocessor Embedded Systems: A Case Study
Uložené v:
| Názov: | Ensuring Secure Program Execution in Multiprocessor Embedded Systems: A Case Study |
|---|---|
| Autori: | Krutartha Patel, Sri Parameswaran, Seng Lin Shee |
| Prispievatelia: | The Pennsylvania State University CiteSeerX Archives |
| Zdroj: | http://www.cecs.uci.edu/~papers/esweek07/codes/p57.pdf. |
| Zbierka: | CiteSeerX |
| Predmety: | General Terms Security, Measurement, Design Keywords Code Injection Attacks, Multiprocessors, Tensilica, Security, Embedded System Processors |
| Popis: | Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered security threats. Most solutions to this problem in the single processor domain are purely software based and have high overheads. A few hardware solutions have been provided for the single processor case, which significantly reduce overheads. In this paper, for the first time, we propose a methodology addressing code injection attacks in a multiprocessor domain. A dedicated security (monitor) processor is used to oversee the application at runtime. Each processor communicates with the monitor processor through a FIFO queue, and is continuously checked. Static analysis of program map and timing profile are used to obtain program information at compile time, which is utilized by the monitor processor at runtime. This information is encrypted using a secure key and stored in the monitor processor. A copy of this secure key is built into the processor’s hardware and is used for decryption by the monitor processor. Each basic block of the program is also instrumented with security information that uniquely identifies itself at runtime. The information from static analysis thus allows the monitor processor to supervise the proceedings on each processor at runtime. Our approach uses a combination of hardware and software techniques to keep overheads to a minimum. We implemented our methodology on a commercial extensible processor (Xtensa LX). Our approach successfully detects the execution of injected code when tested on a JPEG multiprocessor benchmark. The results show a small increase of 6.6 % in application processors ’ runtime (clock cycle count) and 35.2 % in code size for the JPEG encoder benchmark. |
| Druh dokumentu: | text |
| Popis súboru: | application/pdf |
| Jazyk: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.9874; http://www.cecs.uci.edu/~papers/esweek07/codes/p57.pdf |
| Dostupnosť: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.9874 http://www.cecs.uci.edu/~papers/esweek07/codes/p57.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Prístupové číslo: | edsbas.BDC6936D |
| Databáza: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.9874# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Patel%20K Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.BDC6936D RelevancyScore: 750 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 750 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Ensuring Secure Program Execution in Multiprocessor Embedded Systems: A Case Study – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Krutartha+Patel%22">Krutartha Patel</searchLink><br /><searchLink fieldCode="AR" term="%22Sri+Parameswaran%22">Sri Parameswaran</searchLink><br /><searchLink fieldCode="AR" term="%22Seng+Lin+Shee%22">Seng Lin Shee</searchLink> – Name: Author Label: Contributors Group: Au Data: The Pennsylvania State University CiteSeerX Archives – Name: TitleSource Label: Source Group: Src Data: <i>http://www.cecs.uci.edu/~papers/esweek07/codes/p57.pdf</i>. – Name: Subset Label: Collection Group: HoldingsInfo Data: CiteSeerX – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22General+Terms+Security%22">General Terms Security</searchLink><br /><searchLink fieldCode="DE" term="%22Measurement%22">Measurement</searchLink><br /><searchLink fieldCode="DE" term="%22Design+Keywords+Code+Injection+Attacks%22">Design Keywords Code Injection Attacks</searchLink><br /><searchLink fieldCode="DE" term="%22Multiprocessors%22">Multiprocessors</searchLink><br /><searchLink fieldCode="DE" term="%22Tensilica%22">Tensilica</searchLink><br /><searchLink fieldCode="DE" term="%22Security%22">Security</searchLink><br /><searchLink fieldCode="DE" term="%22Embedded+System+Processors%22">Embedded System Processors</searchLink> – Name: Abstract Label: Description Group: Ab Data: Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered security threats. Most solutions to this problem in the single processor domain are purely software based and have high overheads. A few hardware solutions have been provided for the single processor case, which significantly reduce overheads. In this paper, for the first time, we propose a methodology addressing code injection attacks in a multiprocessor domain. A dedicated security (monitor) processor is used to oversee the application at runtime. Each processor communicates with the monitor processor through a FIFO queue, and is continuously checked. Static analysis of program map and timing profile are used to obtain program information at compile time, which is utilized by the monitor processor at runtime. This information is encrypted using a secure key and stored in the monitor processor. A copy of this secure key is built into the processor’s hardware and is used for decryption by the monitor processor. Each basic block of the program is also instrumented with security information that uniquely identifies itself at runtime. The information from static analysis thus allows the monitor processor to supervise the proceedings on each processor at runtime. Our approach uses a combination of hardware and software techniques to keep overheads to a minimum. We implemented our methodology on a commercial extensible processor (Xtensa LX). Our approach successfully detects the execution of injected code when tested on a JPEG multiprocessor benchmark. The results show a small increase of 6.6 % in application processors ’ runtime (clock cycle count) and 35.2 % in code size for the JPEG encoder benchmark. – Name: TypeDocument Label: Document Type Group: TypDoc Data: text – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.9874; http://www.cecs.uci.edu/~papers/esweek07/codes/p57.pdf – Name: URL Label: Availability Group: URL Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.9874<br />http://www.cecs.uci.edu/~papers/esweek07/codes/p57.pdf – Name: Copyright Label: Rights Group: Cpyrght Data: Metadata may be used without restrictions as long as the oai identifier remains attached to it. – Name: AN Label: Accession Number Group: ID Data: edsbas.BDC6936D |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.BDC6936D |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: English Subjects: – SubjectFull: General Terms Security Type: general – SubjectFull: Measurement Type: general – SubjectFull: Design Keywords Code Injection Attacks Type: general – SubjectFull: Multiprocessors Type: general – SubjectFull: Tensilica Type: general – SubjectFull: Security Type: general – SubjectFull: Embedded System Processors Type: general Titles: – TitleFull: Ensuring Secure Program Execution in Multiprocessor Embedded Systems: A Case Study Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Krutartha Patel – PersonEntity: Name: NameFull: Sri Parameswaran – PersonEntity: Name: NameFull: Seng Lin Shee – PersonEntity: Name: NameFull: The Pennsylvania State University CiteSeerX Archives IsPartOfRelationships: – BibEntity: Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: http://www.cecs.uci.edu/~papers/esweek07/codes/p57.pdf Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science