Cargando…
A cycle-level recovery method for embedded processor against HT tamper
As the core of Internet of Things (IoT), embedded processors are being used more and more extensive. However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against H...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10285180/ https://www.ncbi.nlm.nih.gov/pubmed/37360108 http://dx.doi.org/10.1016/j.heliyon.2023.e17085 |
_version_ | 1785061555179618304 |
---|---|
author | Zhou, Wanting Ye, Kuo-Hui Yuan, Shiwei Li, Lei |
author_facet | Zhou, Wanting Ye, Kuo-Hui Yuan, Shiwei Li, Lei |
author_sort | Zhou, Wanting |
collection | PubMed |
description | As the core of Internet of Things (IoT), embedded processors are being used more and more extensive. However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against HT tamper is proposed, which builds two hardware-implementation units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. Once a HT tamper is detected, the two units will carry out fast recovery through rolling back to the exact PC address corresponding to the wrong instruction and resuming the instruction execution. An open RISC-V core of PULPino is adopted for recovery mechanism verification, the experimental results and hardware costs show that the proposed method could guarantee the processor restore from abnormal state in real time with a reasonable hardware overhead. |
format | Online Article Text |
id | pubmed-10285180 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-102851802023-06-23 A cycle-level recovery method for embedded processor against HT tamper Zhou, Wanting Ye, Kuo-Hui Yuan, Shiwei Li, Lei Heliyon Research Article As the core of Internet of Things (IoT), embedded processors are being used more and more extensive. However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against HT tamper is proposed, which builds two hardware-implementation units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. Once a HT tamper is detected, the two units will carry out fast recovery through rolling back to the exact PC address corresponding to the wrong instruction and resuming the instruction execution. An open RISC-V core of PULPino is adopted for recovery mechanism verification, the experimental results and hardware costs show that the proposed method could guarantee the processor restore from abnormal state in real time with a reasonable hardware overhead. Elsevier 2023-06-13 /pmc/articles/PMC10285180/ /pubmed/37360108 http://dx.doi.org/10.1016/j.heliyon.2023.e17085 Text en © 2023 The Authors https://creativecommons.org/licenses/by-nc-nd/4.0/This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). |
spellingShingle | Research Article Zhou, Wanting Ye, Kuo-Hui Yuan, Shiwei Li, Lei A cycle-level recovery method for embedded processor against HT tamper |
title | A cycle-level recovery method for embedded processor against HT tamper |
title_full | A cycle-level recovery method for embedded processor against HT tamper |
title_fullStr | A cycle-level recovery method for embedded processor against HT tamper |
title_full_unstemmed | A cycle-level recovery method for embedded processor against HT tamper |
title_short | A cycle-level recovery method for embedded processor against HT tamper |
title_sort | cycle-level recovery method for embedded processor against ht tamper |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10285180/ https://www.ncbi.nlm.nih.gov/pubmed/37360108 http://dx.doi.org/10.1016/j.heliyon.2023.e17085 |
work_keys_str_mv | AT zhouwanting acyclelevelrecoverymethodforembeddedprocessoragainsthttamper AT yekuohui acyclelevelrecoverymethodforembeddedprocessoragainsthttamper AT yuanshiwei acyclelevelrecoverymethodforembeddedprocessoragainsthttamper AT lilei acyclelevelrecoverymethodforembeddedprocessoragainsthttamper AT zhouwanting cyclelevelrecoverymethodforembeddedprocessoragainsthttamper AT yekuohui cyclelevelrecoverymethodforembeddedprocessoragainsthttamper AT yuanshiwei cyclelevelrecoverymethodforembeddedprocessoragainsthttamper AT lilei cyclelevelrecoverymethodforembeddedprocessoragainsthttamper |