2020 15th Design &Amp; Technology of Integrated Systems in Nanoscale Era (DTIS) 2020
DOI: 10.1109/dtis48698.2020.9081314
|View full text |Cite
|
Sign up to set email alerts
|

A FPGA-based Control-Flow Integrity Solution for Securing Bare-Metal Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…Because of the small capabilities of these devices, this extension must be as tiny as possible in terms of additional computational resources, and must not compromise the real-time nature of the execution. An example is given by [14], where a lightweight solution is presented to protect firmware running on a microcontroller through the use of an external FPGA, which implements a checker. Checks are triggered at critical branch points by a single instruction that invokes the FPGA.…”
Section: Discussionmentioning
confidence: 99%
“…Because of the small capabilities of these devices, this extension must be as tiny as possible in terms of additional computational resources, and must not compromise the real-time nature of the execution. An example is given by [14], where a lightweight solution is presented to protect firmware running on a microcontroller through the use of an external FPGA, which implements a checker. Checks are triggered at critical branch points by a single instruction that invokes the FPGA.…”
Section: Discussionmentioning
confidence: 99%
“…The fine-grained CFI performs static analysis on the code before execution, constructs corresponding control flow graphs, and verifies the validity of all transfer instructions at runtime. Although fine-grained checking mechanisms offer high security, they typically lead to considerable performance overhead [ 2 ], which makes their practical application in embedded systems difficult. Hu proposed the unique code target (UCT) CFI attribute and developed an uCFI prototype based on this attribute.…”
Section: Introductionmentioning
confidence: 99%
“…While popular architectures already have instruction sets that implement CFI, new proposals are emerging that implement these protections for FPGA systems [26,18] and RISC-V [15]. Besides hardware implementations, Section 2.1.6 present the need for even finer policies, so current research proposes new policies that aim at the reduction of EC sizes [42].…”
Section: New Researchesmentioning
confidence: 99%