A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems

As technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with the data or control flow of an embedded system. How...

Full description

Bibliographic Details
Main Authors: Qiang Hao, Zhun Zhang, Dongdong Xu, Jiqing Wang, Jiakang Liu, Jinlei Zhang, Jinhui Ma, Xiang Wang
Format: Article
Language:English
Published: MDPI AG 2022-08-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/15/7750
_version_ 1827618536529330176
author Qiang Hao
Zhun Zhang
Dongdong Xu
Jiqing Wang
Jiakang Liu
Jinlei Zhang
Jinhui Ma
Xiang Wang
author_facet Qiang Hao
Zhun Zhang
Dongdong Xu
Jiqing Wang
Jiakang Liu
Jinlei Zhang
Jinhui Ma
Xiang Wang
author_sort Qiang Hao
collection DOAJ
description As technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with the data or control flow of an embedded system. However, simply overlaying multiple security methods will result in excessive performance overhead for embedded systems. In this paper, we propose a novel hardware security-monitoring architecture that extracts DI (data integrity) digests and CFI (control flow integrity) tags to generate reference information when the program is offline. To monitor the indirect jumping behavior, this paper maps the legal target addresses into the bitmap, thus saving the search time. When the program is loaded, the reference information and the bitmap are safely loaded into the on-chip memory. The hardware monitoring module designed in this paper will check the DI summary and CFI tags in real time while executing the program. The architecture proposed in this paper has been implemented on the Xilinx Virtex 5 FPGA platform. Experimental results show that, compared with existing protection methods, the proposed approach in this paper can effectively detect multiple tampering-type attacks on the data and control flow of the embedded system, with a performance overhead of about 6%.
first_indexed 2024-03-09T10:10:00Z
format Article
id doaj.art-f012edc6679e4aebb73632cbade20908
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T10:10:00Z
publishDate 2022-08-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-f012edc6679e4aebb73632cbade209082023-12-01T22:50:48ZengMDPI AGApplied Sciences2076-34172022-08-011215775010.3390/app12157750A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded SystemsQiang Hao0Zhun Zhang1Dongdong Xu2Jiqing Wang3Jiakang Liu4Jinlei Zhang5Jinhui Ma6Xiang Wang7School of Electronic and Information Engineering, Beihang University, Beijing 100191, ChinaSchool of Electronic and Information Engineering, Beihang University, Beijing 100191, ChinaSchool of Electronic and Information Engineering, Beihang University, Beijing 100191, ChinaSchool of Electronic and Information Engineering, Beihang University, Beijing 100191, ChinaSchool of Electronic and Information Engineering, Beihang University, Beijing 100191, ChinaSchool of Electronic and Information Engineering, Beihang University, Beijing 100191, ChinaSchool of Electronic and Information Engineering, Beihang University, Beijing 100191, ChinaSchool of Electronic and Information Engineering, Beihang University, Beijing 100191, ChinaAs technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with the data or control flow of an embedded system. However, simply overlaying multiple security methods will result in excessive performance overhead for embedded systems. In this paper, we propose a novel hardware security-monitoring architecture that extracts DI (data integrity) digests and CFI (control flow integrity) tags to generate reference information when the program is offline. To monitor the indirect jumping behavior, this paper maps the legal target addresses into the bitmap, thus saving the search time. When the program is loaded, the reference information and the bitmap are safely loaded into the on-chip memory. The hardware monitoring module designed in this paper will check the DI summary and CFI tags in real time while executing the program. The architecture proposed in this paper has been implemented on the Xilinx Virtex 5 FPGA platform. Experimental results show that, compared with existing protection methods, the proposed approach in this paper can effectively detect multiple tampering-type attacks on the data and control flow of the embedded system, with a performance overhead of about 6%.https://www.mdpi.com/2076-3417/12/15/7750embedded systemsecurity monitoringdata integrity (DI)control flow integrity (CFI)
spellingShingle Qiang Hao
Zhun Zhang
Dongdong Xu
Jiqing Wang
Jiakang Liu
Jinlei Zhang
Jinhui Ma
Xiang Wang
A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
Applied Sciences
embedded system
security monitoring
data integrity (DI)
control flow integrity (CFI)
title A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
title_full A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
title_fullStr A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
title_full_unstemmed A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
title_short A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
title_sort hardware security monitoring architecture based on data integrity and control flow integrity for embedded systems
topic embedded system
security monitoring
data integrity (DI)
control flow integrity (CFI)
url https://www.mdpi.com/2076-3417/12/15/7750
work_keys_str_mv AT qianghao ahardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT zhunzhang ahardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT dongdongxu ahardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT jiqingwang ahardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT jiakangliu ahardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT jinleizhang ahardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT jinhuima ahardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT xiangwang ahardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT qianghao hardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT zhunzhang hardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT dongdongxu hardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT jiqingwang hardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT jiakangliu hardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT jinleizhang hardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT jinhuima hardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems
AT xiangwang hardwaresecuritymonitoringarchitecturebasedondataintegrityandcontrolflowintegrityforembeddedsystems