Semantics-Directed Prototyping of Hardware Runtime Monitors
Title | Semantics-Directed Prototyping of Hardware Runtime Monitors |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Harrison, William L., Allwein, Gerard |
Conference Name | 2018 International Symposium on Rapid System Prototyping (RSP) |
Date Published | oct |
ISBN Number | 978-1-5386-7557-1 |
Keywords | Biomedical monitoring, building memory protection mechanisms, composability, embedded hardware, embedded processor, Embedded systems, formal verification, Hardware, hardware monitor, hardware runtime monitors, hardware security, hardware-based protection, high level synthesis, Human Behavior, human factors, Instruction sets, Model driven development, Monitoring, multiple memory accesses, pubcrawl, rapid-prototyping runtime monitors, reconfigurable architectures, resilience, Resiliency, rop attacks, ROP-style code reuse attacks, Runtime, Scalability, security of data, Semantics, semantics-directed prototyping, software monitor, software-based attacks |
Abstract | Building memory protection mechanisms into embedded hardware is attractive because it has the potential to neutralize a host of software-based attacks with relatively small performance overhead. A hardware monitor, being at the lowest level of the system stack, is more difficult to bypass than a software monitor and hardware-based protections are also potentially more fine-grained than is possible in software: an individual instruction executing on a processor may entail multiple memory accesses, all of which may be tracked in hardware. Finally, hardware-based protection can be performed without the necessity of altering application binaries. This article presents a proof-of-concept codesign of a small embedded processor with a hardware monitor protecting against ROP-style code reuse attacks. While the case study is small, it indicates, we argue, an approach to rapid-prototyping runtime monitors in hardware that is quick, flexible, and extensible as well as being amenable to formal verification. |
URL | https://ieeexplore.ieee.org/document/8631992 |
DOI | 10.1109/RSP.2018.8631992 |
Citation Key | harrison_semantics-directed_2018 |
- ROP-style code reuse attacks
- Monitoring
- multiple memory accesses
- pubcrawl
- rapid-prototyping runtime monitors
- reconfigurable architectures
- resilience
- Resiliency
- rop attacks
- Model driven development
- Runtime
- Scalability
- security of data
- Semantics
- semantics-directed prototyping
- software monitor
- software-based attacks
- Biomedical monitoring
- Instruction sets
- Human Factors
- Human behavior
- high level synthesis
- hardware-based protection
- Hardware Security
- hardware runtime monitors
- hardware monitor
- Hardware
- formal verification
- embedded systems
- embedded processor
- embedded hardware
- composability
- building memory protection mechanisms