Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic

Embedded systems are subjecting to various kinds of security threats. Some malicious attacks exploit valid code gadgets to launch destructive actions or to reveal critical details. Some previous memory encryption strategies aiming at this issue suffer from unacceptable performance overhead and resource consumption. This paper proposes a hardware based confidentiality protection method to secure the code and data stored and transferred in embedded systems. This method takes advantage of the I/D-cache structure to reduce the frequency of the cryptographic encryption and decryption processing. We implement the AES engine with composite field arithmetic to reduce the cost of hardware implementation. The proposed architecture is implemented on EP2C70 FPGA chip with OpenRisc 1200 based SoC. The experiment results show that the AES engine is required to work only in the case of I/D-cache miss and the hardware implementation overhead can save 53.24% and 13.39% for the AES engine and SoC respectively.

[1]  Edward J. McCluskey,et al.  Control-flow checking by software signatures , 2002, IEEE Trans. Reliab..

[2]  Bin Xu,et al.  A novel security validation in embedded system , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[3]  Wei Zhang,et al.  A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[4]  Stephen Taylor,et al.  Memory encryption , 2014, ACM Comput. Surv..

[5]  Aleksandar Milenkovic,et al.  Security extensions for integrity and confidentiality in embedded processors , 2009, Microprocess. Microsystems.

[6]  Yunheung Paek,et al.  Integration of ROP/JOP monitoring IPs in an ARM-based SoC , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[7]  Marco Ramilli,et al.  Return-Oriented Programming , 2012, IEEE Security & Privacy.

[8]  Petru Eles,et al.  Optimization of Message Encryption for Real-Time Applications in Embedded Systems , 2018, IEEE Transactions on Computers.

[9]  Zhenkai Liang,et al.  Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.

[10]  Ming Fan,et al.  Improving AES Core Performance via an Advanced ASBUS Protocol , 2018, ACM J. Emerg. Technol. Comput. Syst..

[11]  Shay Gueron Attacks on Encrypted Memory and Constructions for Memory Protection , 2016, 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[12]  Artemios G. Voyiatzis,et al.  Security challenges in embedded systems , 2013, ACM Trans. Embed. Comput. Syst..