Semantics-Directed Prototyping of Hardware Runtime Monitors
| Title | Semantics-Directed Prototyping of Hardware Runtime Monitors |
| Publication Type | Conference Paper |
| Year of Publication | 2018 |
| Authors | Harrison, William L., Allwein, Gerard |
| Conference Name | 2018 International Symposium on Rapid System Prototyping (RSP) |
| Date Published | oct |
| ISBN Number | 978-1-5386-7557-1 |
| Keywords | Biomedical monitoring, building memory protection mechanisms, composability, embedded hardware, embedded processor, Embedded systems, formal verification, Hardware, hardware monitor, hardware runtime monitors, hardware security, hardware-based protection, high level synthesis, Human Behavior, human factors, Instruction sets, Model driven development, Monitoring, multiple memory accesses, pubcrawl, rapid-prototyping runtime monitors, reconfigurable architectures, resilience, Resiliency, rop attacks, ROP-style code reuse attacks, Runtime, Scalability, security of data, Semantics, semantics-directed prototyping, software monitor, software-based attacks |
| Abstract | Building memory protection mechanisms into embedded hardware is attractive because it has the potential to neutralize a host of software-based attacks with relatively small performance overhead. A hardware monitor, being at the lowest level of the system stack, is more difficult to bypass than a software monitor and hardware-based protections are also potentially more fine-grained than is possible in software: an individual instruction executing on a processor may entail multiple memory accesses, all of which may be tracked in hardware. Finally, hardware-based protection can be performed without the necessity of altering application binaries. This article presents a proof-of-concept codesign of a small embedded processor with a hardware monitor protecting against ROP-style code reuse attacks. While the case study is small, it indicates, we argue, an approach to rapid-prototyping runtime monitors in hardware that is quick, flexible, and extensible as well as being amenable to formal verification. |
| URL | https://ieeexplore.ieee.org/document/8631992 |
| DOI | 10.1109/RSP.2018.8631992 |
| Citation Key | harrison_semantics-directed_2018 |
- ROP-style code reuse attacks
- Monitoring
- multiple memory accesses
- pubcrawl
- rapid-prototyping runtime monitors
- reconfigurable architectures
- resilience
- Resiliency
- rop attacks
- Model driven development
- Runtime
- Scalability
- security of data
- Semantics
- semantics-directed prototyping
- software monitor
- software-based attacks
- Biomedical monitoring
- Instruction sets
- Human Factors
- Human behavior
- high level synthesis
- hardware-based protection
- Hardware Security
- hardware runtime monitors
- hardware monitor
- Hardware
- formal verification
- embedded systems
- embedded processor
- embedded hardware
- composability
- building memory protection mechanisms
