ARMHEx: A hardware extension for DIFT on ARM-based SoCs

Abstract

Security is a major issue nowadays for the embedded systems community. Untrustworthy authorities may use a wide range of attacks in order to retrieve critical information. This paper introduces ARMHEx, a practical solution targeting DIFT (Dynamic Information Flow Tracking) on ARM-based SoCs (e.g. Xilinx Zynq). Current DIFT implementations suffer from two major drawbacks. First, recovering required information for DIFT is generally based on software instrumentation leading to high time overheads. ARMHEx takes profit of ARM CoreSight debug components and static analysis to drastically reduce instrumentation time overhead (up to 90% compared to existing works). Then, security of the DIFT hardware extension itself is not considered in related works. In this work, we tackle this issue by proposing a solution based on ARM Trustzone.

DOI: 10.23919/FPL.2017.8056767

10 Figures and Tables

Cite this paper

@article{Wahab2017ARMHExAH, title={ARMHEx: A hardware extension for DIFT on ARM-based SoCs}, author={Muhammad Abdul Wahab and Pascal Cotret and Mounir Nasr Allah and Guillaume Hiet and Vianney Lapotre and Guy Gogniat}, journal={2017 27th International Conference on Field Programmable Logic and Applications (FPL)}, year={2017}, pages={1-7} }