2022
DOI: 10.1049/ise2.12059
|View full text |Cite
|
Sign up to set email alerts
|

IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions

Abstract: A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processor system as flaws or vulnerabilities. To address this problem that may cause potentially serious security breaches, the instruction set architecture (ISA) monitor and secure cache (IMSC) is proposed. As a lightweight solution, IM… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…We match this machine code with the fixed values and opcodes in the database○ 2 . Specifically, if any field of h s successfully matches the fixed value in the database, we will further extract and compare the opcode field between the machine code to be tested and the database○ 3 . A successful match indicates that the machine code is legal and can be disassembled, and the analysis of the instructions will be continued.…”
Section:  mentioning
confidence: 99%
See 1 more Smart Citation
“…We match this machine code with the fixed values and opcodes in the database○ 2 . Specifically, if any field of h s successfully matches the fixed value in the database, we will further extract and compare the opcode field between the machine code to be tested and the database○ 3 . A successful match indicates that the machine code is legal and can be disassembled, and the analysis of the instructions will be continued.…”
Section:  mentioning
confidence: 99%
“…Such an important infrastructure also attracts attackers to take advantage of the loopholes to achieve their illegal purposes. Nowadays, the instruction set which serves as a critical interface between processor hardware units and software is no longer reliable [3]. Duflot L. [4] is the first to discover the existence of undocumented instructions in processors.…”
Section: Introductionmentioning
confidence: 99%