{"title":"Embedded Architectural Design Using Protection Logics to Defend Attack of Buffer Overflow and Unauthorized Access of Code","authors":"C. Yau, Y. Tan, A. Fong, P. L. Mok","doi":"10.1109/CIT.2008.WORKSHOPS.119","DOIUrl":null,"url":null,"abstract":"As security is always a major concern in most of the networked computer systems, embedded systems should provide security features to defend the attack and protect the confidential and sensitive data. Many Trojan Horses and viruses use the security holes of exception to trigger attack, such as buffer overflow attack. Although most embedded systems rely on the programmer, the compiler or the third-party security software to defend and protect the systems against the buffer overflow attack, these techniques could not completely maintain the overall system security. Using a secure programming language is another approach to protect the system, but this approach contains a large security hole that break the overall security. Therefore, this paper proposes a secure Java embedded processor architecture called jHISC with protection logic to protect the system naturally. This new processor realized the natural secure language features of Java in the core architecture to enhance the overall system security. It performs various rigid hardware bound checks and embedded access control checks to avoid the code bypassing. The current implementation phase is under version 4 with 4 KB instruction cache and 8 KB data cache is described by VHDL and implemented and verified in a Xilinx Virtex FPGA.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
As security is always a major concern in most of the networked computer systems, embedded systems should provide security features to defend the attack and protect the confidential and sensitive data. Many Trojan Horses and viruses use the security holes of exception to trigger attack, such as buffer overflow attack. Although most embedded systems rely on the programmer, the compiler or the third-party security software to defend and protect the systems against the buffer overflow attack, these techniques could not completely maintain the overall system security. Using a secure programming language is another approach to protect the system, but this approach contains a large security hole that break the overall security. Therefore, this paper proposes a secure Java embedded processor architecture called jHISC with protection logic to protect the system naturally. This new processor realized the natural secure language features of Java in the core architecture to enhance the overall system security. It performs various rigid hardware bound checks and embedded access control checks to avoid the code bypassing. The current implementation phase is under version 4 with 4 KB instruction cache and 8 KB data cache is described by VHDL and implemented and verified in a Xilinx Virtex FPGA.