Collaborative Monitors for Embedded System Security

This paper presents a hardware based approach to embedded systems security. Usage of on-chip monitors is proposed for identifying attacks on embedded systems by tracking the operation of the system. Two types of monitors: a processing monitor and thermal monitor are presented with their detailed operation and results. The effectiveness of this security system can be enhanced by correlating information from both monitors through collaborative decision making.

[1]  Sylvain Guilley,et al.  SoCs security: a war against side-channels , 2004, Ann. des Télécommunications.

[2]  S. Naffziger,et al.  Power and temperature control on a 90-nm Itanium family processor , 2006, IEEE Journal of Solid-State Circuits.

[3]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[4]  Dean M. Tullsen,et al.  Reducing power with dynamic critical path information , 2001, Proceedings. 34th ACM/IEEE International Symposium on Microarchitecture. MICRO-34.

[5]  Tilman Wolf,et al.  Reconfigurable Security Support for Embedded Systems , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[6]  Patrick Schaumont,et al.  Domain-Specific Codesign for Embedded Security , 2003, Computer.

[7]  Trevor Mudge,et al.  MiBench: A free, commercially representative embedded benchmark suite , 2001 .

[8]  Lazaros F. Merakos,et al.  Security in third Generation Mobile Networks , 2004, Comput. Commun..

[9]  Jeannette M. Wing A call to action look beyond the horizon , 2003, IEEE Security & Privacy Magazine.

[10]  Christof Paar,et al.  Security on FPGAs: State-of-the-art implementations and attacks , 2004, TECS.

[11]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[12]  Srivaths Ravi,et al.  Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.

[13]  Carla E. Brodley,et al.  Heat stroke: power-density-based denial of service in SMT , 2005, 11th International Symposium on High-Performance Computer Architecture.

[14]  Margaret Martonosi,et al.  Wattch: a framework for architectural-level power analysis and optimizations , 2000, Proceedings of 27th International Symposium on Computer Architecture (IEEE Cat. No.RS00201).

[15]  Trent Jaeger,et al.  Secure coprocessor-based intrusion detection , 2002, EW 10.

[16]  Kevin Skadron,et al.  Using performance counters for runtime temperature sensing in high-performance processors , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[17]  G. Gogniat,et al.  Reconfigurable Security Primitive for Embedded Systems , 2005, 2005 International Symposium on System-on-Chip.

[18]  R. Iris Bahar,et al.  Combining software and hardware monitoring for improved power and performance tuning , 2003, Seventh Workshop on Interaction Between Compilers and Computer Architectures, 2003. INTERACT-7 2003. Proceedings..

[19]  David Zhang,et al.  Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.

[20]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[21]  Kevin Skadron,et al.  Monitoring temperature in FPGA based SoCs , 2005, 2005 International Conference on Computer Design.

[22]  Tao Zhang,et al.  HIDE: an infrastructure for efficiently protecting information leakage on the address bus , 2004, ASPLOS XI.

[23]  K. Skadron,et al.  Potential thermal security risks , 2005, Semiconductor Thermal Measurement and Management IEEE Twenty First Annual IEEE Symposium, 2005..

[24]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[25]  Jean-Jacques Quisquater,et al.  Power Analysis of FPGAs: How Practical is the Attack? , 2003, FPL.

[26]  Jeannette M. Wing,et al.  Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.