Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank

Author(s):  
Sean Kramer ◽  
Zhiming Zhang ◽  
Jaya Dofe ◽  
Qiaoyan Yu
Author(s):  
Michael Kramer ◽  
Martin Horauer

Embedded Systems software reliability is increasingly important, therefore methods to harden existing software are needed. In general, hardening software against various failures is a necessity in modern computer systems. A lot of work has been published regarding many possible ways to achieve this non-functional requirement. Relevant topics include, e.g., test procedures, recommended development flows, and hardware measures like watchdog timers. One of these methods seems very promising to be software implemented in modern embedded systems: Control Flow Checking by signatures. Various authors have shown the effectiveness and feasibility of Control Flow Checking (CFC) by signatures for personal computer software. For instance it has been shown for standard computer-systems, that CFC is capable of reducing undetected control flow errors by at least one magnitude. This survey will focus on the applicability of such software hardening methods to embedded systems, while adhering mainly to software based approaches. Published methods will be summarized and compared. Furthermore methods to simplify derived control-flow graphs to essential states will be emphasized. Finally the possibility to apply run-time verification to the Control-flow Checking Software is considered.


2013 ◽  
Vol 321-324 ◽  
pp. 2979-2984
Author(s):  
Xue Han ◽  
Xiang Feng Suo

By designing high reliable modules with special functions, the paper realizes the identification to security compiler expansion grammar, shows compiling information of the control flow testing level and supports grammar security subset; it also achieves the grammar highlights of a variety of highly reliable security algorithm by using the dynamic profile approach, which provides more safety guarantee to the development of embedded systems from its beginning.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 42394-42406 ◽  
Author(s):  
Ming Zhang ◽  
Zonghua Gu ◽  
Hong Li ◽  
Nenggan Zheng

Sign in / Sign up

Export Citation Format

Share Document