Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1391469.1391686acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

SHIELD: a software hardware design methodology for security and reliability of MPSoCs

Published: 08 June 2008 Publication History

Abstract

Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Previous attempts to detect code injection in MPSoCs have been burdened with significant performance overheads. In this work, we present a hardware/software methodology "SHIELD" to detect code injection attacks in MPSoCs. SHIELD instruments the software programs running on application processors in the MPSoC and also extracts control flow and basic block execution time information for runtime checking.
We employ a dedicated security processor (monitor processor) to supervise the application processors on the MPSoC. Custom hardware is designed and used in the monitor and application processors. The monitor processor uses the custom hardware to rapidly analyze information communicated to it from the application processors at runtime. We have implemented SHIELD on a commercial extensible processor (Xtensa LX2) and tested it on a multiprocessor JPEG encoder program. In addition to code injection attacks, the system is also able to detect 83% of bit flips errors in the control flow instructions.
The experiments show that SHIELD produces systems with runtime which is at least 9 times faster than the previous solution. SHIELD incurs a runtime (clock cycles) performance overhead of only 6.6% and an area overhead of 26.9%, when compared to a non-secure system.

References

[1]
D. Arora et al. Secure embedded processing through hardware-assisted run-time monitoring. In DATE '05, pages 178--183, Washington, DC, USA, 2005.
[2]
C. Cowan et al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. 7th USENIX Security Conference, pages 63--78, San Antonio, Texas, jan 1998.
[3]
N. Dor, M. Rodeh, and M. Sagiv. Cssv: towards a realistic tool for statically detecting all buffer overflows in c. In PLDI '03, pages 155--167, New York, NY, USA, 2003.
[4]
J. G. Dyer et al. Building the ibm 4758 secure coprocessor. Computer, 34(10):57--66, 2001.
[5]
D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities, pages 177--190, 2001.
[6]
E. Larson and T. Austin. High coverage detection of input-related security facults. In SSYM '03, pages 9--9, Berkeley, CA, USA, 2003. USENIX Association.
[7]
J. Mcgregor et al. A processor architecture defense against buffer overflow attacks. pages 243--250, 2003.
[8]
M. Milenkovic, A. Milenkovic, and E. Jovanov. Hardware support for code integrity in embedded processors. In CASES '05, pages 55--65, New York, NY, USA, 2005.
[9]
G. C. Necula, S. McPeak, and W. Weimer. Ccured: type-safe retrofitting of legacy code. In POPL '02, pages 128--139, New York, NY, USA, 2002.
[10]
J. Ohlsson, M. Rimn, and U. Gunneflo. A study of the effects of transient fault injection into a 32-bit rice with built-in watchdog. In FTCS, pages 316--325, 1992.
[11]
K. Patel, S. Parameswaran, and S. L. Shee. Ensuring secure program execution in multiprocessor embedded systems: a case study. In CODES+ISSS '07, pages 57--62, New York, NY, USA, 2007.
[12]
J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4):20--27, 2004.
[13]
R. G. Ragel and S. Parameswaran. Impres: integrated monitoring for processor reliability and security. In DAC '06, pages 502--505, New York, NY, USA, 2006.
[14]
S. Ravi et al. Security in embedded systems: Design challenges. ACM Trans. Embedded Comput. Syst., 3(3):461--491, 2004.
[15]
C. Rowen and D. Maydan. Automated processor generation for system-on-chip. Technical report, Sept 2001.
[16]
M. A. Schuette and J. P. Shen. Processor control flow monitoring using signatured instruction streams. IEEE Trans. Comput., 36(3):264--276, 1987.
[17]
M. Shafique, L. Bauer, and J. Henkel. An optimized application architecture of the h.264 video encoder for application specific platforms. ESTIMedia 2007, pages 119--124, 4--5 Oct. 2007.
[18]
S. L. Shee and S. Parameswaran. Design methodology for pipelined heterogeneous multiprocessor system. In DAC, pages 811--816, 2007.
[19]
D. Wagner et al. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, pages 3--17, San Diego, CA, February 2000.
[20]
Y. Younan, W. Joosen, and F. Piessens. Code injection in C and C++: A survey of vulnerabilities and countermeasures. Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July 2004.

Cited By

View all
  • (2022)Challenges and Opportunities for Hardware-Assisted Security Improvements in the Field2022 23rd International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED54688.2022.9806254(90-95)Online publication date: 6-Apr-2022
  • (2020)Statistical time-based intrusion detection in embedded systemsProceedings of the 23rd Conference on Design, Automation and Test in Europe10.5555/3408352.3408479(562-567)Online publication date: 9-Mar-2020
  • (2020)Statistical Time-based Intrusion Detection in Embedded Systems2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE48585.2020.9116369(562-567)Online publication date: Mar-2020
  • Show More Cited By

Index Terms

  1. SHIELD: a software hardware design methodology for security and reliability of MPSoCs

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DAC '08: Proceedings of the 45th annual Design Automation Conference
      June 2008
      993 pages
      ISBN:9781605581156
      DOI:10.1145/1391469
      • General Chair:
      • Limor Fix
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 June 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. architecture
      2. bit flips
      3. code injection
      4. multiprocessors
      5. tensilica

      Qualifiers

      • Research-article

      Conference

      DAC '08
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

      Upcoming Conference

      DAC '25
      62nd ACM/IEEE Design Automation Conference
      June 22 - 26, 2025
      San Francisco , CA , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 08 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Challenges and Opportunities for Hardware-Assisted Security Improvements in the Field2022 23rd International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED54688.2022.9806254(90-95)Online publication date: 6-Apr-2022
      • (2020)Statistical time-based intrusion detection in embedded systemsProceedings of the 23rd Conference on Design, Automation and Test in Europe10.5555/3408352.3408479(562-567)Online publication date: 9-Mar-2020
      • (2020)Statistical Time-based Intrusion Detection in Embedded Systems2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE48585.2020.9116369(562-567)Online publication date: Mar-2020
      • (2020)Temporal-based intrusion detection for IoVit - Information Technology10.1515/itit-2020-000962:5-6(227-239)Online publication date: 5-Dec-2020
      • (2019)Window-based statistical analysis of timing subcomponents for efficient detection of malware in life-critical systemsProceedings of the Modeling and Simulation in Medicine Symposium10.5555/3338264.3338271(1-12)Online publication date: 29-Apr-2019
      • (2019)Window-Based Statistical Analysis Of Timing Subcomponents For Efficient Detection Of Malware In Life-Critical Systems2019 Spring Simulation Conference (SpringSim)10.23919/SpringSim.2019.8732899(1-12)Online publication date: Apr-2019
      • (2019)Data-driven Anomaly Detection with Timing Features for Embedded SystemsACM Transactions on Design Automation of Electronic Systems10.1145/327994924:3(1-27)Online publication date: 2-Apr-2019
      • (2018)Prediction of abnormal temporal behavior in real-time systemsProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167172(359-367)Online publication date: 9-Apr-2018
      • (2018)Investigating Reliability and Security of Integrated Circuits and Systems2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI.2018.00029(106-111)Online publication date: Jul-2018
      • (2018)Hardware-Based Probabilistic Threat Detection and Estimation for Embedded Systems2018 IEEE 36th International Conference on Computer Design (ICCD)10.1109/ICCD.2018.00084(522-529)Online publication date: Oct-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media