Next Article in Journal
Effect of Situational and Individual Factors on Training Load and Game Performance in Liga Femenina 2 Basketball Female Players
Previous Article in Journal
An Observer-Based Current Sensor-Less Control Scheme for Grid-Following Converters
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems

School of Electronic and Information Engineering, Beihang University, Beijing 100191, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(15), 7750; https://doi.org/10.3390/app12157750
Submission received: 2 July 2022 / Revised: 26 July 2022 / Accepted: 26 July 2022 / Published: 1 August 2022

Abstract

As technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with the data or control flow of an embedded system. However, simply overlaying multiple security methods will result in excessive performance overhead for embedded systems. In this paper, we propose a novel hardware security-monitoring architecture that extracts DI (data integrity) digests and CFI (control flow integrity) tags to generate reference information when the program is offline. To monitor the indirect jumping behavior, this paper maps the legal target addresses into the bitmap, thus saving the search time. When the program is loaded, the reference information and the bitmap are safely loaded into the on-chip memory. The hardware monitoring module designed in this paper will check the DI summary and CFI tags in real time while executing the program. The architecture proposed in this paper has been implemented on the Xilinx Virtex 5 FPGA platform. Experimental results show that, compared with existing protection methods, the proposed approach in this paper can effectively detect multiple tampering-type attacks on the data and control flow of the embedded system, with a performance overhead of about 6%.
Keywords: embedded system; security monitoring; data integrity (DI); control flow integrity (CFI) embedded system; security monitoring; data integrity (DI); control flow integrity (CFI)

Share and Cite

MDPI and ACS Style

Hao, Q.; Zhang, Z.; Xu, D.; Wang, J.; Liu, J.; Zhang, J.; Ma, J.; Wang, X. A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems. Appl. Sci. 2022, 12, 7750. https://doi.org/10.3390/app12157750

AMA Style

Hao Q, Zhang Z, Xu D, Wang J, Liu J, Zhang J, Ma J, Wang X. A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems. Applied Sciences. 2022; 12(15):7750. https://doi.org/10.3390/app12157750

Chicago/Turabian Style

Hao, Qiang, Zhun Zhang, Dongdong Xu, Jiqing Wang, Jiakang Liu, Jinlei Zhang, Jinhui Ma, and Xiang Wang. 2022. "A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems" Applied Sciences 12, no. 15: 7750. https://doi.org/10.3390/app12157750

APA Style

Hao, Q., Zhang, Z., Xu, D., Wang, J., Liu, J., Zhang, J., Ma, J., & Wang, X. (2022). A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems. Applied Sciences, 12(15), 7750. https://doi.org/10.3390/app12157750

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop