A survey of microarchitecture support for embedded processor security

Arun K. Kanuparthi, Ramesh Karri, Gaston Ormazabal, Sateesh K. Addepalli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The number of attacks on embedded processors is on the rise. Attackers exploit vulnerabilities in the software to launch new attacks and get unauthorized access to sensitive information stored in these devices. Several solutions have been proposed by both the academia and the industry to protect the programs running on these embedded-processor based computer systems. After a description of the several attacks that threaten a computer system, this paper surveys existing defenses - software-based and hardware-based (watchdog checkers, integrity trees, memory encryption, and modification of processor architecture), that protect against such attacks. This paper also provides a comparative discussion of their advantages and disadvantages.

Original languageEnglish (US)
Title of host publicationProceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012
Pages368-373
Number of pages6
DOIs
StatePublished - 2012
Event2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012 - Amherst, MA, United States
Duration: Aug 19 2012Aug 21 2012

Other

Other2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012
CountryUnited States
CityAmherst, MA
Period8/19/128/21/12

Fingerprint

Computer systems
Computer hardware
Cryptography
Data storage equipment
Industry

Keywords

  • Dynamic Integrity Checking
  • Embedded Processors
  • Hardware Security
  • Microarchitecture Support

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Cite this

Kanuparthi, A. K., Karri, R., Ormazabal, G., & Addepalli, S. K. (2012). A survey of microarchitecture support for embedded processor security. In Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012 (pp. 368-373). [6296501] https://doi.org/10.1109/ISVLSI.2012.64

A survey of microarchitecture support for embedded processor security. / Kanuparthi, Arun K.; Karri, Ramesh; Ormazabal, Gaston; Addepalli, Sateesh K.

Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012. 2012. p. 368-373 6296501.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kanuparthi, AK, Karri, R, Ormazabal, G & Addepalli, SK 2012, A survey of microarchitecture support for embedded processor security. in Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012., 6296501, pp. 368-373, 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012, Amherst, MA, United States, 8/19/12. https://doi.org/10.1109/ISVLSI.2012.64
Kanuparthi AK, Karri R, Ormazabal G, Addepalli SK. A survey of microarchitecture support for embedded processor security. In Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012. 2012. p. 368-373. 6296501 https://doi.org/10.1109/ISVLSI.2012.64
Kanuparthi, Arun K. ; Karri, Ramesh ; Ormazabal, Gaston ; Addepalli, Sateesh K. / A survey of microarchitecture support for embedded processor security. Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012. 2012. pp. 368-373
@inproceedings{0175b5c7758b41e3af47a8b7d91d45f6,
title = "A survey of microarchitecture support for embedded processor security",
abstract = "The number of attacks on embedded processors is on the rise. Attackers exploit vulnerabilities in the software to launch new attacks and get unauthorized access to sensitive information stored in these devices. Several solutions have been proposed by both the academia and the industry to protect the programs running on these embedded-processor based computer systems. After a description of the several attacks that threaten a computer system, this paper surveys existing defenses - software-based and hardware-based (watchdog checkers, integrity trees, memory encryption, and modification of processor architecture), that protect against such attacks. This paper also provides a comparative discussion of their advantages and disadvantages.",
keywords = "Dynamic Integrity Checking, Embedded Processors, Hardware Security, Microarchitecture Support",
author = "Kanuparthi, {Arun K.} and Ramesh Karri and Gaston Ormazabal and Addepalli, {Sateesh K.}",
year = "2012",
doi = "10.1109/ISVLSI.2012.64",
language = "English (US)",
isbn = "9780769547671",
pages = "368--373",
booktitle = "Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012",

}

TY - GEN

T1 - A survey of microarchitecture support for embedded processor security

AU - Kanuparthi, Arun K.

AU - Karri, Ramesh

AU - Ormazabal, Gaston

AU - Addepalli, Sateesh K.

PY - 2012

Y1 - 2012

N2 - The number of attacks on embedded processors is on the rise. Attackers exploit vulnerabilities in the software to launch new attacks and get unauthorized access to sensitive information stored in these devices. Several solutions have been proposed by both the academia and the industry to protect the programs running on these embedded-processor based computer systems. After a description of the several attacks that threaten a computer system, this paper surveys existing defenses - software-based and hardware-based (watchdog checkers, integrity trees, memory encryption, and modification of processor architecture), that protect against such attacks. This paper also provides a comparative discussion of their advantages and disadvantages.

AB - The number of attacks on embedded processors is on the rise. Attackers exploit vulnerabilities in the software to launch new attacks and get unauthorized access to sensitive information stored in these devices. Several solutions have been proposed by both the academia and the industry to protect the programs running on these embedded-processor based computer systems. After a description of the several attacks that threaten a computer system, this paper surveys existing defenses - software-based and hardware-based (watchdog checkers, integrity trees, memory encryption, and modification of processor architecture), that protect against such attacks. This paper also provides a comparative discussion of their advantages and disadvantages.

KW - Dynamic Integrity Checking

KW - Embedded Processors

KW - Hardware Security

KW - Microarchitecture Support

UR - http://www.scopus.com/inward/record.url?scp=84867749663&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84867749663&partnerID=8YFLogxK

U2 - 10.1109/ISVLSI.2012.64

DO - 10.1109/ISVLSI.2012.64

M3 - Conference contribution

AN - SCOPUS:84867749663

SN - 9780769547671

SP - 368

EP - 373

BT - Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012

ER -