Efficient Security Monitoring with the Core Debug Interface in an Embedded Processor

被引:19
作者
Lee, Jinyong [1 ,2 ]
Heo, Ingoo [1 ,2 ]
Lee, Yongje [1 ,2 ,3 ]
Paek, Yunheung [1 ,2 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, 1 Gwanak Ro, Seoul, South Korea
[2] Seoul Natl Univ, ISRC, 1 Gwanak Ro, Seoul, South Korea
[3] Samsung Elect Co Ltd, Suwon, South Korea
基金
新加坡国家研究基金会;
关键词
Core debug interface (CDI); security monitoring; dynamic information flow tracking (DIFT); code reuse attack detection; HARDWARE ACCELERATION; PROTECTION;
D O I
10.1145/2907611
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For decades, various concepts in security monitoring have been proposed. In principle, they all in common in regard to the monitoring of the execution behavior of a program (e.g., control-flow or dataflow) running on the machine to find symptoms of attacks. Among the proposed monitoring schemes, software-based ones are known for their adaptability on the commercial products, but there have been concerns that they may suffer from nonnegligible runtime overhead. On the other hand, hardware-based solutions are recognized for their high performance. However, most of them have an inherent problem in that they usually mandate drastic changes to the internal processor architecture. More recent ones have strived to minimize such modifications by employing external hardware security monitors in the system. However, these approaches intrinsically suffer from the overhead caused by communication between the host and the external monitor. Our solution also relies on external hardware for security monitoring, but unlike the others, ours tackles the communication overhead by using the core debug interface (CDI), which is readily available in most commercial processors for debugging. We build our system simply by plugging our monitoring hardware into the processor via CDI, precluding the need for altering the processor internals. To validate the effectiveness of our approach, we implement two well-known monitoring techniques on our proposed framework: dynamic information flow tracking and branch regulation. The experimental results on our FPGA prototype show that our external hardware monitors efficiently perform monitoring tasks with negligible performance overhead, mainly with thanks to the support of CDI, which helps us reduce communication costs substantially.
引用
收藏
页数:29
相关论文
共 69 条
  • [11] Buchanan E, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P27
  • [12] Carlini N, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P161
  • [13] Return-Oriented Programming without Returns
    Checkoway, Stephen
    Davi, Lucas
    Dmitrienko, Alexandra
    Sadeghi, Ahmad-Reza
    Shacham, Hovav
    Winandy, Marcel
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 559 - 572
  • [14] Chen P, 2009, LECT NOTES COMPUT SC, V5905, P163, DOI 10.1007/978-3-642-10772-6_13
  • [15] Flexible hardware acceleration for instruction-grain program monitoring
    Chen, Shimin
    Kozuch, Michael
    Strigkos, Theodoros
    Falsafi, Babak
    Gibbons, Phillip B.
    Mowry, Todd C.
    Ramachandran, Vijaya
    Ruwase, Olatunji
    Ryan, Michael
    Vlachos, Evangelos
    [J]. ISCA 2008 PROCEEDINGS: 35TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, 2008, : 377 - +
  • [16] Cheng Q., 2006, IEEE 11 S COMPUTCOMM, P749
  • [17] Clause James., 2007, P IEEEACM INT C AUTO, P284, DOI [10.1145/1321631.1321673, DOI 10.1145/1321631.1321673]
  • [18] Crane S., 2015, P IEEE S SEC PRIV SP
  • [19] Dalton M, 2007, CONF PROC INT SYMP C, P482, DOI 10.1145/1273440.1250722
  • [20] Davi L., 2012, P 19 ANN NETW DISTR