DocumentCode
511706
Title
Research on the Embedded Security Architecture Based on the Control Flow Security
Author
Qingyu, Ou ; Kai, Huang ; Xiaoping, Wu
Author_Institution
Depart. of Inf. Security, Naval Univ. of Eng., Wuhan, China
Volume
1
fYear
2009
fDate
28-30 Oct. 2009
Firstpage
133
Lastpage
137
Abstract
As an important parameter reflecting the system´s behavior evidence, control flow has been the focus for attackers to carry out attacks on the security of a system. However, most of the security guards for control flow have been resting on the software level without considering the system architecture. Moreover, the current security guarding methods for control flow have much higher demands for the system´s resources, and they are not suitable for the embedded application environment which has limited resources. To solve these problems, this paper introduces a security guarding architecture which combines the Cache with the random permutation. This security guarding architecture takes full advantage of the Cache´s modulation function on the system´s performance and the restraining function on the control flow information leakage. Combining with the random permutation algorithm, it provides with a high level security guard for the system control flow, and brings a better balance between the system security and the system efficiency.
Keywords
embedded systems; security of data; software architecture; Cache; control flow; embedded system; modulation function; random permutation; security guarding architecture; Application software; Computer architecture; Computer security; Control systems; Data security; Embedded system; Information security; Protection; System buses; System software; control flow; embedded system; random permutation; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Engineering, 2009. WCSE '09. Second International Workshop on
Conference_Location
Qingdao
Print_ISBN
978-0-7695-3881-5
Type
conf
DOI
10.1109/WCSE.2009.638
Filename
5403455
Link To Document