Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring

Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in "trusted" software that they execute. Security attacks exploit these vulnerabilities to trigger unintended program behavior, such as the l...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Design, Automation and Test in Europe s. 178 - 183
Hlavní autori: Arora, Divya, Ravi, Srivaths, Raghunathan, Anand, Jha, Niraj K.
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: Washington, DC, USA IEEE Computer Society 07.03.2005
IEEE
Edícia:ACM Conferences
Predmet:
ISBN:9780769522883, 0769522882
ISSN:1530-1591
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in "trusted" software that they execute. Security attacks exploit these vulnerabilities to trigger unintended program behavior, such as the leakage of sensitive data or the execution of malicious code. In this work, we present a hardware-assisted paradigm to enhance embedded system security by detecting and preventing unintended program behavior. Specifically, we extract properties of an embedded program through static program analysis, and use them as the bases for enforcing permissible program behavior in real-time as the program executes. We present an architecture for hardware-assisted run-time monitoring, wherein the embedded processor is augmented with a hardware monitor that observes the processor's dynamic execution trace, checks whether the execution trace falls within the allowed program behavior, and flags any deviations from the expected behavior to trigger appropriate response mechanisms. We present properties that can be used to capture permissible program behavior at different levels of granularity within a program, namely inter-procedural control flow, intra-procedural control flow, and instruction stream integrity. We also present a systematic methodology to design application-specific hardware monitors for any given embedded program. We have evaluated the hardware requirements and performance of the proposed architecture for several embedded software benchmarks. Hardware implementations using a commercial design flow, and architectural simulations using the SimpleScalar framework, indicate that the proposed technique can thwart several common software and physical attacks, facilitating secure program execution with minimal overheads.
AbstractList Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in "trusted" software that they execute. Security attacks exploit these vulnerabilities to trigger unintended program behavior, such as the leakage of sensitive data or the execution of malicious code. In this work, we present a hardware-assisted paradigm to enhance embedded system security by detecting and preventing unintended program behavior. Specifically, we extract properties of an embedded program through static program analysis, and use them as the bases for enforcing permissible program behavior in real-time as the program executes. We present an architecture for hardware-assisted run-time monitoring, wherein the embedded processor is augmented with a hardware monitor that observes the processor's dynamic execution trace, checks whether the execution trace falls within the allowed program behavior, and flags any deviations from the expected behavior to trigger appropriate response mechanisms. We present properties that can be used to capture permissible program behavior at different levels of granularity within a program, namely inter-procedural control flow, intra-procedural control flow, and instruction stream integrity. We also present a systematic methodology to design application-specific hardware monitors for any given embedded program. We have evaluated the hardware requirements and performance of the proposed architecture for several embedded software benchmarks. Hardware implementations using a commercial design flow, and architectural simulations using the SimpleScalar framework, indicate that the proposed technique can thwart several common software and physical attacks, facilitating secure program execution with minimal overheads.
Author Jha, Niraj K.
Raghunathan, Anand
Arora, Divya
Ravi, Srivaths
Author_xml – sequence: 1
  givenname: Divya
  surname: Arora
  fullname: Arora, Divya
  organization: Princeton University, Princeton, NJ
– sequence: 2
  givenname: Srivaths
  surname: Ravi
  fullname: Ravi, Srivaths
  organization: NEC Laboratories America, Princeton, NJ
– sequence: 3
  givenname: Anand
  surname: Raghunathan
  fullname: Raghunathan, Anand
  organization: NEC Laboratories America, Princeton, NJ
– sequence: 4
  givenname: Niraj K.
  surname: Jha
  fullname: Jha, Niraj K.
  organization: Princeton University, Princeton, NJ
BookMark eNqNkE1LAzEURQNWsNYuXbmZlSun5qOZJMtSqxUURes6ZJI37WhnUpMZxH9vSgW3vs2Fx-HCPado0PoWEDoneEIIVtc3s9ViQjHmE1oUR2ishMSiUJxSKdkADQlnOCdckRM0jvEdp2NqSgoxRMtXsH2AbNGU4By47Dl4CzHW7TrrNsH36022NMF9mQD5LP1jl6CXvs1XdQPZo2_rzodEn6HjymwjjH9zhN5uF6v5Mn94urufzx5yQ8W0y6WjRFDrMAdKQLDSSAN0agSppFOVIiWueEUJodY4YSuwmEmDWenoVDFJ2AhdHnp3wX_2EDvd1NHCdmta8H3ULI2VkhcJvDiANQDoXagbE741YYpzTv9qjG106f1H1ATrvU29t6n3NnWymcCrf4G6DDVU7AfX9HRp
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/DATE.2005.266
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EndPage 183
ExternalDocumentID 1395552
Genre orig-research
Conference Paper
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
ACM
ADPZR
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
GUFHI
OCL
RIB
RIC
RIE
RIL
123
29F
29O
6IH
AAWTH
ABLEC
ADZIZ
CHZPO
FEDTE
IEGSK
IPLJI
KZ1
LMP
M43
RNS
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-a274t-8d2172cd05e21e73ba8ae24a71f8d9f91b0f5f2112cad7cfec038a03bd2493813
IEDL.DBID RIE
ISBN 9780769522883
0769522882
ISICitedReferencesCount 69
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000228086900033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1530-1591
IngestDate Thu Jul 10 18:42:41 EDT 2025
Wed Aug 27 02:14:00 EDT 2025
Wed Jan 31 06:48:15 EST 2024
Wed Jan 31 06:38:23 EST 2024
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MeetingName DATE05: Design, Automation and Test in Europe
MergedId FETCHMERGED-LOGICAL-a274t-8d2172cd05e21e73ba8ae24a71f8d9f91b0f5f2112cad7cfec038a03bd2493813
Notes SourceType-Conference Papers & Proceedings-1
ObjectType-Conference Paper-1
content type line 25
PQID 31538856
PQPubID 23500
PageCount 6
ParticipantIDs acm_books_10_1109_DATE_2005_266
proquest_miscellaneous_31538856
acm_books_10_1109_DATE_2005_266_brief
ieee_primary_1395552
PublicationCentury 2000
PublicationDate 20050307
20050000
PublicationDateYYYYMMDD 2005-03-07
2005-01-01
PublicationDate_xml – month: 03
  year: 2005
  text: 20050307
  day: 07
PublicationDecade 2000
PublicationPlace Washington, DC, USA
PublicationPlace_xml – name: Washington, DC, USA
PublicationSeriesTitle ACM Conferences
PublicationTitle Design, Automation and Test in Europe
PublicationTitleAbbrev DATE
PublicationYear 2005
Publisher IEEE Computer Society
IEEE
Publisher_xml – name: IEEE Computer Society
– name: IEEE
SSID ssj0000394167
ssj0005329
Score 1.9269538
Snippet Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in...
SourceID proquest
ieee
acm
SourceType Aggregation Database
Publisher
StartPage 178
SubjectTerms Communication system security
Computer architecture
Computer systems organization -- Embedded and cyber-physical systems
Computer systems organization -- Real-time systems
Data security
Embedded software
Embedded system
General and reference -- Cross-computing tools and techniques -- Verification
Hardware
Hardware -- Hardware validation
Information security
Mathematics of computing -- Discrete mathematics -- Graph theory -- Graph algorithms
Monitoring
National electric code
Runtime
Software and its engineering -- Software creation and management -- Software development process management
Software and its engineering -- Software creation and management -- Software verification and validation -- Formal software verification
Software and its engineering -- Software organization and properties -- Software functional properties -- Formal methods -- Software verification
Theory of computation -- Semantics and reasoning -- Program reasoning -- Program analysis
Theory of computation -- Semantics and reasoning -- Program reasoning -- Program verification
Theory of computation -- Semantics and reasoning -- Program semantics
Title Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
URI https://ieeexplore.ieee.org/document/1395552
https://www.proquest.com/docview/31538856
WOSCitedRecordID wos000228086900033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB4B6qFcoEDFAm19aG91ceKYOEdEd8WhQhwAcbP8GEscNouyu_D3GTvZpVIrIW6J8rImnqc93wfwPWovdWUbbrGOvFJYcGdVwr0VASmALmyGY7j7U19d6fv75noDfq57YRAxbz7DX-kwr-WHmV-mUtkpRStKKTK4m3Vd971a63qKkE2Vm7pX2ztkZigjhRacXHbRp-wNhRsUUw7IO6tz-Qq-efr7_Gbcl1rKhJy4af10IF75x1pnFzTZed_gd-HgtZePXa-91CfYwHYPdlZkDmzQ7T3Y_guZcB8ucx0eGU4dkmkK7LFvKKCLbKD2Yalf69l2yCn-TpMlsG7Z8kRWz6bZUqRXHcDtZHxzcckH0gVuKUFdcB0SZZUPQmFZYC2d1RbLytZF1KGJTeFEVJHSxtLbUPuIXkhthXSBEjly__IzbLWzFg-BOV1iUDHYWJWVc7YpMKGpVV6KKogQRvCNpGtSNjE3ORkRjUnyT9yYypD8R_DjjTuM6x4wjmA_Cdw89ggdZpA1fWD1xwxpTVoKsS3OlnMjk6HX6uzo_w8ew8cM0ZpLLSewteiW-AU--KfFw7z7mifeC-ivz9U
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9QwEB6VgkS5FNoitjzqA9wwdWK7cY4IWi1iWfWwoN4sOx5LPWy2yu62f79jJ7tFAglxS5SXNfE87fk-gPfRNNIoV3OHVeRKY8G90wn3VgSkALpwGY7h16SaTs3VVX25Ax-3vTCImDef4ad0mNfyw6JZp1LZKUUrWmsyuI-1UmXRd2ttKypC1iq3dW82eMjMUUYqLTg57aJP2msKOCiqHLB3NufyAX7z9Ovn2XlfbCkTduIj18wH6pU_7HV2Qhf7_zf853D00M3HLrd-6gXsYHsA-xs6BzZo9wE8-w2b8BDGuRKPDOceyTgFdtO3FNBFNpD7sNSxdec65BSBp-kSWLdueaKrZ_NsK9KrjuDnxfnsy5gPtAvcUYq64iYk0qomCI1lgZX0zjgslauKaEId68KLqCMljmXjQtVEbIQ0TkgfKJWjAEC-hN120eIrYN6UGHQMLqpSee_qAhOemmqkUEGEMIITkq5N-cTS5nRE1DbJP7FjakvyH8GHf9xhfXeNcQSHSeD2psfosIOs6QObP2ZJb9JiiGtxsV5amUy90WfHf3_wBJ6OZz8mdvJt-v017GXA1lx4eQO7q26Nb-FJc7u6Xnbv8iS8B-e_0xw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Design%2C+Automation%2C+and+Test+in+Europe%3A+Proceedings+of+the+conference+on+Design%2C+Automation+and+Test+in+Europe+-+Volume+1%3B+07-11+Mar.+2005&rft.atitle=Secure+Embedded+Processing+through+Hardware-Assisted+Run-Time+Monitoring&rft.au=Arora%2C+Divya&rft.au=Srivaths%2C+Ravi&rft.au=Raghunathan%2C+Anand&rft.au=Jha%2C+Niraj+K&rft.date=2005-03-07&rft.isbn=9780769522883&rft.issn=1530-1591&rft.spage=178&rft.epage=183&rft_id=info:doi/10.1109%2FDATE.2005.266&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-1591&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-1591&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-1591&client=summon