DocumentCode :
2606813
Title :
Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards
Author :
Leontie, Eugen ; Gelbart, Olga ; Narahari, Bhagirath ; Simha, Rahul
Author_Institution :
Comput. Sci. Dept., George Washington Univ., Washington, DC, USA
fYear :
2010
fDate :
23-25 Aug. 2010
Firstpage :
125
Lastpage :
130
Abstract :
Embedded systems of an inherently distributed and highly replicated nature are vulnerable to a class of attacks that require local access and physical tampering. Processors using Encrypted Execution and Data (EED) technology, where instructions and data are stored in encrypted form in memory and locally decrypted, form an attractive solution for securing embedded systems, as these platforms have been shown to protect software and limit information leakage. However, numerous realistic attacks are still possible on EED platforms given the assumption of an adversary with physical access. In this paper, we present an integrated compiler and architectural approach to address a class of memory spoofing attacks, in which a sophisticated attacker is able to control off-chip buses and modify data blocks as they are loaded into the processor. Our approach, which utilizes cache boundaries to greatly simplify the integrity checking process, prevents an attacker from tampering, injecting, or replaying code and data. We make use of an on-chip reconfigurable logic component to implement our security mechanisms. This use of reconfigurable logic greatly simplifies the required hardware modifications - no changes are necessary to the CPU, cache, or off-chip memory. Our simulations on a number of benchmarks show that a high level of security can be achieved with a low performance overhead. The average overhead incurred is dependent on the cache size and type of integrity checking scheme used, but is less than 16% even for the most computationally intensive scheme. We present a hardware/software prototype mapped to a Field Programmable Gate Array (FPGA) platform in order to evaluate the space required and demonstrate the feasibility of our approach.
Keywords :
benchmark testing; cache storage; cryptography; data integrity; embedded systems; field programmable gate arrays; hardware-software codesign; memory architecture; multiprocessing systems; program compilers; system buses; EED technology; architectural approach; cache aware FPGA guard; cache boundary; encrypted execution and data technology; field programmable gate array platform; hardware-software prototype; information leakage; integrated compiler; integrity checking process; memory spoofing detection; off chip bus; off chip memory; onchip reconfigurable logic; secure embedded system; software protection; Benchmark testing; Encryption; Field programmable gate arrays; Hardware; Memory management; Program processors; Encrypted Execution; Field-Programmable Gate Array (FPGA); Protection; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security (IAS), 2010 Sixth International Conference on
Conference_Location :
Atlanta, GA
Print_ISBN :
978-1-4244-7407-3
Type :
conf
DOI :
10.1109/ISIAS.2010.5604197
Filename :
5604197
Link To Document :
بازگشت