Cargando…

A cycle-level recovery method for embedded processor against HT tamper

As the core of Internet of Things (IoT), embedded processors are being used more and more extensive. However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against H...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhou, Wanting, Ye, Kuo-Hui, Yuan, Shiwei, Li, Lei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10285180/
https://www.ncbi.nlm.nih.gov/pubmed/37360108
http://dx.doi.org/10.1016/j.heliyon.2023.e17085
_version_ 1785061555179618304
author Zhou, Wanting
Ye, Kuo-Hui
Yuan, Shiwei
Li, Lei
author_facet Zhou, Wanting
Ye, Kuo-Hui
Yuan, Shiwei
Li, Lei
author_sort Zhou, Wanting
collection PubMed
description As the core of Internet of Things (IoT), embedded processors are being used more and more extensive. However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against HT tamper is proposed, which builds two hardware-implementation units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. Once a HT tamper is detected, the two units will carry out fast recovery through rolling back to the exact PC address corresponding to the wrong instruction and resuming the instruction execution. An open RISC-V core of PULPino is adopted for recovery mechanism verification, the experimental results and hardware costs show that the proposed method could guarantee the processor restore from abnormal state in real time with a reasonable hardware overhead.
format Online
Article
Text
id pubmed-10285180
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-102851802023-06-23 A cycle-level recovery method for embedded processor against HT tamper Zhou, Wanting Ye, Kuo-Hui Yuan, Shiwei Li, Lei Heliyon Research Article As the core of Internet of Things (IoT), embedded processors are being used more and more extensive. However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against HT tamper is proposed, which builds two hardware-implementation units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. Once a HT tamper is detected, the two units will carry out fast recovery through rolling back to the exact PC address corresponding to the wrong instruction and resuming the instruction execution. An open RISC-V core of PULPino is adopted for recovery mechanism verification, the experimental results and hardware costs show that the proposed method could guarantee the processor restore from abnormal state in real time with a reasonable hardware overhead. Elsevier 2023-06-13 /pmc/articles/PMC10285180/ /pubmed/37360108 http://dx.doi.org/10.1016/j.heliyon.2023.e17085 Text en © 2023 The Authors https://creativecommons.org/licenses/by-nc-nd/4.0/This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
spellingShingle Research Article
Zhou, Wanting
Ye, Kuo-Hui
Yuan, Shiwei
Li, Lei
A cycle-level recovery method for embedded processor against HT tamper
title A cycle-level recovery method for embedded processor against HT tamper
title_full A cycle-level recovery method for embedded processor against HT tamper
title_fullStr A cycle-level recovery method for embedded processor against HT tamper
title_full_unstemmed A cycle-level recovery method for embedded processor against HT tamper
title_short A cycle-level recovery method for embedded processor against HT tamper
title_sort cycle-level recovery method for embedded processor against ht tamper
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10285180/
https://www.ncbi.nlm.nih.gov/pubmed/37360108
http://dx.doi.org/10.1016/j.heliyon.2023.e17085
work_keys_str_mv AT zhouwanting acyclelevelrecoverymethodforembeddedprocessoragainsthttamper
AT yekuohui acyclelevelrecoverymethodforembeddedprocessoragainsthttamper
AT yuanshiwei acyclelevelrecoverymethodforembeddedprocessoragainsthttamper
AT lilei acyclelevelrecoverymethodforembeddedprocessoragainsthttamper
AT zhouwanting cyclelevelrecoverymethodforembeddedprocessoragainsthttamper
AT yekuohui cyclelevelrecoverymethodforembeddedprocessoragainsthttamper
AT yuanshiwei cyclelevelrecoverymethodforembeddedprocessoragainsthttamper
AT lilei cyclelevelrecoverymethodforembeddedprocessoragainsthttamper