Browse > Article

Performance Evaluation of Secure Embedded Processor using FEC-Based Instruction-Level Correlation Technique  

Lee, Seung-Wook (성균관대학교 정보통신공학부)
Kwon, Soon-Gyu (성균관대학교 정보통신공학부)
Kim, Jong-Tae (성균관대학교 정보통신공학부)
Abstract
In this paper, we propose new novel technique (ILCT: Instruction-Level Correlation Technique) which can detect tempered instructions by software attacks or hardware attacks before their execution. In conventional works, due to both high complex computation of cipher process and low processing speed of cipher modules, existing secure processor architecture applying cipher technique can cause serious performance degradation. While, the secure processor architecture applying ILCT with FEC does not incur excessive performance decrease by complexity of computation and speed of tampering detection modules. According to experimental results, total memory overhead including parity are increased in average of 26.62%. Also, secure programs incur CPI degradation in average of $1.20%{\sim}1.97%$.
Keywords
embedded processor; computer security; FEC;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Murat Fiskiran, Ruby B. Lee, 'Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution', ICCD 2004, pp. 452-457, Oct. 2004   DOI
2 Andrew Huang, 'Keeping Secrets in Hardware: The Microsoft XboxTM Case Study,' Cryptographic Hardware and Embedded Systems - CHES 2002, pp. 213 - 227, Aug. 2002   DOI
3 R. B. Lee, et al. 'Enlisting hardware architecture to thwart malicious code injection', In Proceedings of the 2003 International Conference on Security in Pervasive Computing, 2003
4 S. Ravi, et al., 'Security in Embedded Systems: Design Challenges' in ACM Transactions on Embedded Computing Systems, 2004
5 Milena Milenkovi, et al., 'A framework for trusted instruction execution via basic block signature verification' ACM Southeast Regional Conference Proc. of the 42nd annual Southeast regional conference, pp. 191-196, 2004
6 J.P. McGregor, et al., 'A Processor Architecture Defense against Buffer Overflow Attacks', Proc. IEEE Int. Conf. Information Technology: Research and Education (ITRE), pp. 243-250, Aug. 2003   DOI
7 Irving S. Reed and Xuemin Chen, 'Error-Control coding for Data Network', Kluwer Academic Publishers, 1999