IMPRES: Integrated monitoring for processor REliability and security

被引:37
|
作者
Ragel, Roshan G. [1 ]
Parameswaran, Sri
机构
[1] Univ New South Wales, Sch Engn & Comp Sci, Sydney, NSW 2052, Australia
来源
43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006 | 2006年
关键词
design; performance; reliability; security; detecting code injection attacks; basic block check-summing; checksum encryption; bit flips detection;
D O I
10.1109/DAC.2006.229268
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even 'trusted software'. Reliability is of concern where unintended code is executed in modem processors with ever smaller feature sizes and low voltage swings causing bit flips. Countermeasures by software-only approaches increase code size by large amounts and therefore significantly reduce performance. Hardware assisted approaches add extensive amounts of hardware monitors and thus incur unacceptably high hardware cost. This paper presents a novel hardware/software technique at the granularity of micro-instructions to reduce overheads considerably. Experiments show that our technique incurs an additional hardware overhead of 0.91% and clock period increase of 0.06%. Average clock cycle and code size overheads are just 11.9% and 10.6% for five industry standard application benchmarks. These overheads are far smaller than have been previously encountered.
引用
收藏
页码:502 / +
页数:2
相关论文
共 50 条
  • [31] Archipelago: Trading address space for reliability and security
    Lvin, Vitaliy B.
    Novark, Gene
    Berger, Emery D.
    Zorn, Benjamin G.
    ACM SIGPLAN NOTICES, 2008, 43 (03) : 115 - 124
  • [32] Optimal resource allocation for security in reliability systems
    Azaiez, M. N.
    Bier, Vicki M.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 181 (02) : 773 - 786
  • [33] Security and Reliability of Safety-Critical RTOS
    Luna R.
    Islam S.A.
    SN Computer Science, 2021, 2 (5)
  • [34] Security--Reliability Tradeoff for Untrusted and Selfish Relay-Assisted D2D Communications in Heterogeneous Cellular Networks for IoT
    Zhang, Chensi
    Ge, Jianhua
    Gong, Fengkui
    Jia, Fan
    Guo, Ningning
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 2192 - 2201
  • [35] Leveraging 3D Packaging Technology to Enhance Integrated Circuits Security and Reliability
    Zhu, Chunsheng
    Yan, Yingjian
    Guo, Pengfei
    Li, Junwei
    2018 19TH INTERNATIONAL CONFERENCE ON ELECTRONIC PACKAGING TECHNOLOGY (ICEPT), 2018, : 766 - 769
  • [36] Integrated Reliability Evaluation Model for MANET
    You, Zhiyang
    Zhao, Xibin
    Chen, Danning
    Gu, Ming
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2010, 9 : 376 - 381
  • [37] Security Is a Subset of Reliability
    Geer, Daniel E., Jr.
    Conway, Daniel G.
    IEEE SECURITY & PRIVACY, 2008, 6 (06) : 86 - 87
  • [38] A thermally-aware performance analysis of vertically integrated (3-D) processor-memory hierarchy
    Loi, Gian Luca
    Agrawal, Banit
    Srivastava, Navin
    Lin, Sheng-Chih
    Sherwood, Timothy
    Banerjee, Kaustav
    43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, : 991 - +
  • [39] Malicious Processor Detection based on the Security Agent
    Choi, Seong-Muk
    Ryou, Yeol-Joo
    Lee, Hoo-Ki
    Cho, Hee-Hoon
    Kim, Jong-Bae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 47 - 54
  • [40] Integrated photonic modular arithmetic processor
    Wu, Yuepeng
    Guo, Hongxiang
    Zhang, Bowen
    Qiu, Jifang
    Yang, Zhisheng
    Wu, Jian
    PHOTONICS RESEARCH, 2024, 12 (11) : 2676 - 2690