Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking

被引:4
作者
Das, Sanjeev [1 ]
Zhang, Wei [2 ]
Liu, Yang [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
[2] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Hong Kong, Peoples R China
来源
2014 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI) | 2014年
关键词
Dynamic TPM; Control Flow Checking; Reconfigurable Architecture; Runtime Security; ARCHITECTURE; PROTECTION;
D O I
10.1109/ISVLSI.2014.84
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Trusted Platform Module (TPM) has gained its popularity in computing systems as a hardware security approach. TPM provides the boot time security by verifying the platform integrity including hardware and software. However, once the software is loaded, TPM can no longer protect the software execution. In this work, we propose a dynamic TPM design, which performs control flow checking to protect the program from runtime attacks. The control flow checker is integrated at the commit stage of the processor pipeline. The control flow of program is verified to defend the attacks such as stack smashing using buffer overflow and code reuse. We implement the proposed dynamic TPM design in FPGA to achieve high performance, low cost and flexibility for easy functionality upgrade based on FPGA. In our design, neither the source code nor the Instruction Set Architecture (ISA) needs to be changed. The benchmark simulations demonstrate less than 1% of performance penalty on the processor, and an effective software protection from the attacks.
引用
收藏
页码:167 / 172
页数:6
相关论文
共 28 条
[1]   BioBench: A benchmark suite of bioinformatics applications [J].
Albayraktaroglu, K ;
Jaleel, A ;
Wu, X ;
Franklin, M ;
Jacob, B ;
Tseng, CW ;
Yeung, D .
ISPASS 2005: IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE, 2005, :2-9
[2]  
Andersen Starr, 2004, CHANGES FUNCTIONAL 2
[3]  
[Anonymous], 2013, MULTI2SIM CPU GPU SI
[4]  
[Anonymous], 2013, VALGRIND EXP BBV BAS
[5]  
[Anonymous], 2005, P 12 ACM C COMP COMM
[6]  
[Anonymous], 2008, Trusted platform module (tpm) summary
[7]  
ARORA D, 2006, NATO SECURITY SCI D, V2, P18
[8]   Return-Oriented Programming without Returns [J].
Checkoway, Stephen ;
Davi, Lucas ;
Dmitrienko, Alexandra ;
Sadeghi, Ahmad-Reza ;
Shacham, Hovav ;
Winandy, Marcel .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :559-572
[9]   RAD: A compile-time solution to buffer overflow attacks [J].
Chiueh, TC ;
Hsu, FH .
21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, :409-417
[10]  
Cowan C., 1998, STACKGUARD AUTOMATIC