首页> 外文OA文献 >Hardware-software design methods for security and reliability of MPSoCs
【2h】

Hardware-software design methods for security and reliability of MPSoCs

机译:用于MPSoC的安全性和可靠性的软硬件设计方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Security of a Multi-Processor System on Chip (MPSoC) is an emerging area of concern in embedded systems. MPSoC security is jeopardized by Code Injection attacks. Code Injection attacks, which are the most common types of software attacks, have plagued single processor systems. Design of MPSoCs must therefore incorporate security as one of the primary objectives. Code Injection attacks exploit vulnerabilities in rusted" and legacy code.An architecture with a dedicated monitoring processor (MONITOR) is employed to simultaneously supervise the application processors on an MPSoC. The program code in the application processors is divided into basic blocks. The basic blocks in the application processors are statically instrumented with special instructions that allow communication with the MONITOR at runtime. The MONITOR verifies the execution of all the processors at runtime using control flow checks and either a timing or instruction count check.This thesis proposes a monitoring system called SOFTMON, a design methodology called SHIELD, a design flow called LOCS and an architectural framework called CUFFS for detecting Code Injection attacks. SOFTMON, a software monitoring system, uses a software algorithm in the MONITOR. SOFTMON incurs limited area overheads. However, the runtime performance overhead is quite high. SHIELD, an extension to the work in SOFTMON overcomes the limitation of high runtime overhead using a MONITOR that is predominantly hardware based.LOCS uses only one special instruction per basic block compared to two, as was the case in SOFTMON and SHIELD. Additionally, profile information is generated for all the basic blocks in all the application processors for the MPSoC designer to tune the design by increasing or decreasing the frequency of loop basic blocks.CUFFS detects attacks even without application processors communicating to the MONITOR. The SOFTMON, SHIELD and LOCS approaches can only detect attacks if the application processors communicate to the MONITOR. CUFFS relies on the exact number of instructions in basic blocks to determine an attack, rather than time-frame based measures used in SOFTMON, SHIELD and LOCS.The lowest runtime performance overhead was achieved by LOCS (worst case of 37.5%), while the SOFTMON monitoring system had the least amount of area overheads of about 25%. The CUFFS approach employed an active MONITOR and hence detected a greater range of attacks.The CUFFS framework also detects bit flip errors (reliability errors) in the control flow instructions of the application processors on an MPSoC. CUFFS can detect nearly 70% of all bit flip errors in the control flow instructions.Additionally, a modified CUFFS approach is proposed to ensure reliable inter-processor communication on an MPSoC. The modified CUFFS approach uses a hardware based checksum approach for reliable inter-processor communication and incurred a runtime performance overhead of up to 25% and negligible area overheads compared to CUFFS.Thus, the approaches proposed in this thesis equip an MPSoC designer with tools to embed security features during an MPSoC's design phase. Incorporating security measures at the processor design level provides security against software attacks in MPSoCs and incurs manageable runtime, area and code-size overheads.
机译:嵌入式系统中,多处理器片上系统(MPSoC)的安全性是一个新兴的关注领域。代码注入攻击会危害MPSoC的安全性。代码注入攻击是最常见的软件攻击类型,困扰着单处理器系统。因此,MPSoC的设计必须将安全性作为主要目标之一。代码注入攻击利用“受信任”代码和旧代码中的漏洞。采用具有专用监视处理器(MONITOR)的体系结构,同时监视MPSoC上的应用程序处理器。应用程序处理器中的程序代码分为基本块。应用程序处理器中的块通过静态指令专用的指令进行检测,这些指令允许在运行时与MONITOR进行通信,MONITOR在运行时使用控制流检查以及时序或指令计数检查来验证所有处理器的执行情况。称为SOFTMON的设计方法,称为SHIELD的设计方法,称为LOCS的设计流程以及用于检测代码注入攻击的名为CUFFS的体系结构框架;软件监视系统SOFTMON在MONITOR中使用软件算法。运行时性能开销非常高SHIELD,w的扩展SOFTMON中的ork通过使用主要基于硬件的MONITOR克服了高运行时开销的限制。与SOFTMON和SHIELD中的情况相比,LOCS在每个基本块上仅使用一条特殊指令,而在基本块中仅使用一条特殊指令。此外,还会为所有应用处理器中的所有基本块生成配置文件信息,以供MPSoC设计人员通过增加或减少循环基本块的频率来调整设计。即使应用程序处理器不与MONITOR通信,CUFFS也会检测攻击。如果应用程序处理器与MONITOR通信,则SOFTMON,SHIELD和LOCS方法只能检测攻击。 CUFFS依靠基本块中的确切指令数来确定攻击,而不是使用SOFTMON,SHIELD和LOCS中使用的基于时间框架的措施。LOCS实现了最低的运行时性能开销(最坏的情况是37.5%),而SOFTMON监视系统的区域开销最少,约为25%。 CUFFS方法采用了主动式MONITOR,因此可以检测到更大范围的攻击。CUFFS框架还检测MPSoC上应用处理器的控制流指令中的位翻转错误(可靠性错误)。 CUFFS可以检测到控制流指令中几乎70%的所有位翻转错误。此外,提出了一种改进的CUFFS方法,以确保MPSoC上可靠的处理器间通信。改进的CUFFS方法使用基于硬件的校验和方法来实现可靠的处理器间通信,与CUFFS相比,其运行时性能开销高达25%,而面积开销却可以忽略不计。因此,本文提出的方法为MPSoC设计人员提供了用于在MPSoC的设计阶段嵌入安全功能。在处理器设计级别纳入安全措施可提供针对MPSoC中软件攻击的安全性,并产生可管理的运行时,区域和代码大小的开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号