Title :
Simulation of a Secure CPU with SecureTag Technique to Defend Embedded Systems Against Buffer Overflow Attacks
Author :
Grasser, Michael Georg ; Priebsch, Johannes ; Hofer, Georg ; Hodanek, Thomas
Author_Institution :
Graz Univ. of Technol., Graz
Abstract :
The research on security issues is getting more important, as the number of embedded and networked computing systems is constantly increasing. Due to strict restrictions and strong requirements, only special software applications can be used in security-critical embedded systems. So, it is necessary to secure those software applications with a special hardware implementation of a secure processor architecture. In this paper, we propose the architecture of the Secure CPU, including a memory structure using the SecureTag technique for marking memory lines. Our basic idea was to extend CPU registers by two replicas, which represent the lowest and highest value of a particular register. The advantages of this concept are minor changes in the architecture, the permanent and implicit checking of bounds, the secure storage of bounds in the memory and the high compatibility to several software applications. We verified our concept with an adapted processor simulator and describe its adaptations.
Keywords :
buffer storage; security of data; SecureTag technique; buffer overflow attacks; defend embedded systems; memory lines; memory structure; secure CPU; secure storage; security-critical embedded systems; software applications; Application software; Buffer overflow; Computational modeling; Computer architecture; Computer networks; Embedded computing; Embedded software; Embedded system; Hardware; Registers;
Conference_Titel :
Computer Systems and Applications, 2007. AICCSA '07. IEEE/ACS International Conference on
Conference_Location :
Amman
Print_ISBN :
1-4244-1030-4
Electronic_ISBN :
1-4244-1031-2
DOI :
10.1109/AICCSA.2007.370926