• DocumentCode
    939725
  • Title

    Hardware-Assisted Run-Time Monitoring for Secure Program Execution on Embedded Processors

  • Author

    Arora, Divya ; Ravi, Srivaths ; Raghunathan, Anand ; Jha, Niraj K.

  • Author_Institution
    Dept. of Electr. Eng., Princeton Univ., NJ
  • Volume
    14
  • Issue
    12
  • fYear
    2006
  • Firstpage
    1295
  • Lastpage
    1308
  • Abstract
    Embedded system security is often compromised when "trusted" software is subverted to result in unintended behavior, such as leakage of sensitive data or execution of malicious code. Several countermeasures have been proposed in the literature to counteract these intrusions. A common underlying theme in most of them is to define security policies at the system level in an application-independent manner and check for security violations either statically or at run time. In this paper, we present a methodology that addresses this issue from a different perspective. It defines correct execution as synonymous with the way the program was intended to run and employs a dedicated hardware monitor to detect and prevent unintended program behavior. Specifically, we extract properties of an embedded program through static program analysis and use them as the bases for enforcing permissible program behavior at run time. The processor architecture is augmented with a hardware monitor that observes the program\´s dynamic execution trace, checks whether it falls within the allowed program behavior, and flags any deviations from expected behavior to trigger appropriate response mechanisms. We present properties that capture permissible program behavior at different levels of granularity, namely inter-procedural control flow, intra-procedural control flow, and instruction-stream integrity. We outline a systematic methodology to design application-specific hardware monitors for any given embedded program. Hardware implementations using a commercial design flow, and cycle-accurate performance simulations indicate that the proposed technique can thwart several common software and physical attacks, facilitating secure program execution with minimal overheads
  • Keywords
    application specific integrated circuits; embedded systems; microprocessor chips; program diagnostics; program processors; security of data; and instruction-stream integrity; application-specific hardware design; design flow; dynamic execution trace; embedded processors; embedded system security; hardware-assisted run-time monitoring; inter-procedural control flow; intra-procedural control flow; processor architecture; program execution; static program analysis; Application software; Communication system security; Computer architecture; Data security; Embedded software; Embedded system; Hardware; Monitoring; Runtime; Vehicle dynamics; Embedded processors; processor architectures; security and protection; special-purpose and application-based systems;
  • fLanguage
    English
  • Journal_Title
    Very Large Scale Integration (VLSI) Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1063-8210
  • Type

    jour

  • DOI
    10.1109/TVLSI.2006.887799
  • Filename
    4052340