Information Flow Tracking in RISC-V

In the process of globalization, heterogeneous SoCs play an important role in an embedded application, security aspects of such systems are crucial. The system is susceptible to many attacks out of which we focus on the run-time software attacks which causes memory corruption. In this scheme we propose a software-based solution to secure the system integrity by providing Information Flow Tracking (IFT) technique to track the spurious data during run-time and preventing buffer overflow attacks. This scheme is implemented on RISC-V and protects bare-metal applications against memory corruption by adding tag bits to the untrusted data inputs.

[1]  Luciano Lavagno,et al.  Design and Implementation of a Dynamic Information Flow Tracking Architecture to Secure a RISC-V Core for IoT Applications , 2018, 2018 IEEE High Performance extreme Computing Conference (HPEC).

[2]  Jun Xu,et al.  Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.

[3]  Wei Hu,et al.  Register transfer level information flow tracking for provably secure hardware design , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[4]  Yunheung Paek,et al.  HDFI: Hardware-Assisted Data-Flow Isolation , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[5]  Ravishankar K. Iyer,et al.  Defeating memory corruption attacks via pointer taintedness detection , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).