SAFE-OPS: A Compiler/Architecture Approach to Embedded Software Security
نویسندگان
چکیده
The new-found ubiquity of embedded processors in consumer and industrial applications brings with it an intensified focus on security, as a strong level of trust in the system software is crucial to their widespread deployment. The growing area of software protection attempts to address the key steps used by hackers in attacking a software system. In this paper we introduce a unique approach to embedded software protection that utilizes a hardware/software co-design methodology. Results demonstrate that this framework can be the successful basis for the development of embedded applications that meet a wide range of security and performance requirements.
منابع مشابه
A Run-Time Reconfigurable Architecture for Embedded Program Flow Verification
Poorly written software can pose a serious security risk. Applications designed for embedded processors are especially vulnerable, as they tend to be written in lower-level languages for which security features such as runtime array bounds checking are typically not included. The problem is exacerbated by the fact that these potentially insecure embedded applications are widely deployed in a va...
متن کاملChapter 4.2—Languages and Security: Safer Software Through Language and Compiler Techniques
Embedded systems, such as those found in mobile phones or satellites, have grown in popularity in the recent years. Code that executes in these environments need to be verified as safe, so they do not expose sensitive data or hidden APIs to the outside world. With enough knowledge of the code and then environment in which it executes, malicious entities can find and exploit vulnerabilities for ...
متن کاملPerformance Study of a Compiler/Hardware Approach to Embedded Systems Security
Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security challenges in the design of embedded systems. This short paper evaluates the performance of a hardware/software co-design methodology for embedded software protection. Secure software is created using a secure compiler that in...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملSecurity Testing of Software on Embedded Devices Using x86 Platform
Security testing of software on embedded devices is often impeded for lacking advanced program analysis tools. The main obstacle is that state-of-the-art tools do not support the instruction set of common architectures of embedded device (e.g., MIPS). It requires either developing new program analysis tool aiming to architecture or introducing many manual efforts to help security testing. Howev...
متن کامل