Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2591513.2591521acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

A design approach to automatically generate on-chip monitors during high-level synthesis of hardware accelerator

Published: 20 May 2014 Publication History

Abstract

Embedded systems often implement safety critical applications making security a more and more important aspect in their design. Control-Flow Integrity (CFI) attacks are used to modify program behavior and can lead to learn valuable information directly or indirectly by perturbing a system and creating failures. Although CFI attacks are well-known in computer systems, they have been recently shown to be practical and feasible on embedded systems as well. In this context, CFI checks are mainly used to detect unintended software behaviors while very few works address non programmable hardware component monitoring. In this paper, we present a hardware-assisted paradigm to enhance embedded system security by detecting and preventing unintended hardware behavior. We propose a design approach that designs on-chip monitors (OCM) during High-Level Synthesis (HLS) of hardware accelerators (HWacc). Synthesis of OCM is introduced as a set of steps realized concurrently to the HLS flow of HWacc. Automatically generated OCM checks at runtime both the input/output timing behavior and the control flow of the monitored HWacc. Experimental results show the interest of the proposed approach: the error coverage on the control flow ranges from 99.75% to 100% while in average the OCM area overhead is less than 10%, the clock period overhead is at worst less than 5% and impact on the synthesis time is negligible.

References

[1]
R. Vemu; J.A. Abraham; "CEDA: Control-Flow Error Detection Using Assertions," Computers,IEEE Transactions on, vol.60, no.9, pp.1233,1245, Sept. 2011
[2]
N. Oh; P.P. Shirvani; E.J McCluskey; "Control-flow checking by software signatures," Reliability, IEEE Transactions on, vol.51, no.1, pp.111,122, Mar 2002
[3]
A. Benso; S. Di Carlo; G. Di Natale; P. Prinetto; "A watchdog processor to detect data and control flow errors," On-Line Testing Symposium, 2003.9th IEEE, vol., no., pp.144,148, 7--9 July 2003
[4]
T. Michel; R. Leveugle; G. Saucier; "A new approach to control flow checking without program modification," Fault-Tolerant Computing, 1991. FTCS-21. Digest of Papers., Twenty-First International Symposium, vol., no., pp.334,341, 25--27 June 1991
[5]
D. Arora; S. Ravi; A. Raghunathan; N.K. Jha;"Secure embedded processing through hardware-assisted run-time monitoring," DATE, 2005. Proceedings, vol., no., pp.178,183 Vol. 1, 7--11 March 2005
[6]
M. Rahmatian; H. Kooti; I.G. Harris; E. Bozorgzadeh; "Hardware-Assisted Detection of Malicious Software in Embedded Systems," IEEE, Embedded System Lettre, vol.4, no., pp.94,97, Dec. 2012
[7]
Sylvain G., Renaud P., "SoCs security: a war against side-channels", Annales Des Télécommunications Juillet/Aout 2004, Volume 59, Issue 7--8, pp 998--1009
[8]
M. Nueve, E. Peeters, D. Samyde, and J.J. Quisquater; "Memories: a Survey of their Secure Uses in Smart Cards"; Proc. of IEEE SISW 2003, October 2003. Washington DC, USA.
[9]
S.P. Skorobogatov and R.J. Anderson; "Optical Fault Induction Attacks". Proc. of CHES'02, 2002.
[10]
O. Käommerling and M. Kuhn; "Design Principles for Tamper-Resistant Smartcard Processors". Proc. of the Usenix Workshop on Smartcard Technology (Smartcard'99), pages 9{20, May 1999.
[11]
P. Coussy and A. Takach, Special Issue on High-Level Synthesis, IEEE DTC . IEEE Computer Society, 2009, vol. 25
[12]
J. Curreri; G. Stitt; A.D George, "High-level synthesis techniques for in-circuit assertion-based verification," in Proceedings of the 17th Reconfigurable Architectures Workshops, April 2010, pp. 1--8
[13]
A. Ribon; B. Le Gal; C. Jego; D. Dallet;, "Assertion support in high-level synthesis design flow," in Proc. Specification and Design Languages, Sept. 2011, pp. 1--8.
[14]
T. Yunfeng, "An introduction to assertion-based verification," IEEE 8th International Conference on ASIC, 2009, pp. 1318--1323
[15]
Accellera, "Property Specification Language Reference Manual, version 1.1,", 2004
[16]
Accellera, "SystemVerilog 3.la language reference manuall," 2001
[17]
Accellera, "Open Verification Library, Reference Manual," 2009
[18]
D. Borrione, K. Morin-Allory, Y. Oddos, "Property-Based Dynamic Verification and Test", in "Design Technology For Heterogeneous Embedded Systems", Springer 2012
[19]
M. Boule; Z. Zilic, "Efficient Automata-Based Assertion-Checker Synthesis of PSL Properties," IEEE International High-Level Design Validation and Test Workshop, Nov. 2006, pp. 69--76
[20]
H. Paul, "Nesting of Reducible and Irreducible Loops," ACM Transaction on PLS, vol. 19, 1997, pp. 557--567
[21]
P. Coussy, A. Morawiec, "High-Level Synthesis: From Algorithm to Digital Circuit," Springer, 2008
[22]
L. Davi, R. Dmitrienko, M. Egele, T.Fischer, T.Holz, R.Hund, S.Nurnberge, A.Sadeghi "MoCFI: A framework to mitigate control-flow attacks on smartphones", In Proc of the NDSS Sym, 2012.
[23]
K.Pattabiraman, G.P.Sagesse, Z.Kalbarczyk, R.Iyer; "Dynamic Derivation of application-Specific Error Detectors and their Implementation", Proceedings EDCC, 2006, p97--108

Cited By

View all
  • (2017)Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking TechniquesIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2016.25850465:4(576-585)Online publication date: 1-Oct-2017
  • (2017)A Unified Design Flow to Automatically Generate On-Chip Monitors During High-Level Synthesis of Hardware AcceleratorsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2016.258727836:3(384-397)Online publication date: 1-Mar-2017
  • (2016)Enhanced source-level instrumentation for FPGA in-system debug of High-Level Synthesis designs2016 International Conference on Field-Programmable Technology (FPT)10.1109/FPT.2016.7929514(109-116)Online publication date: Dec-2016

Index Terms

  1. A design approach to automatically generate on-chip monitors during high-level synthesis of hardware accelerator

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      GLSVLSI '14: Proceedings of the 24th edition of the great lakes symposium on VLSI
      May 2014
      376 pages
      ISBN:9781450328166
      DOI:10.1145/2591513
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 May 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. hardware monitoring
      2. high-level synthesis
      3. security

      Qualifiers

      • Research-article

      Conference

      GLSVLSI '14
      Sponsor:
      GLSVLSI '14: Great Lakes Symposium on VLSI 2014
      May 21 - 23, 2014
      Texas, Houston, USA

      Acceptance Rates

      GLSVLSI '14 Paper Acceptance Rate 49 of 179 submissions, 27%;
      Overall Acceptance Rate 312 of 1,156 submissions, 27%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 09 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2017)Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking TechniquesIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2016.25850465:4(576-585)Online publication date: 1-Oct-2017
      • (2017)A Unified Design Flow to Automatically Generate On-Chip Monitors During High-Level Synthesis of Hardware AcceleratorsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2016.258727836:3(384-397)Online publication date: 1-Mar-2017
      • (2016)Enhanced source-level instrumentation for FPGA in-system debug of High-Level Synthesis designs2016 International Conference on Field-Programmable Technology (FPT)10.1109/FPT.2016.7929514(109-116)Online publication date: Dec-2016

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media