• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种针对硬件木马的嵌入式处理器循环级恢复方法。

A cycle-level recovery method for embedded processor against HT tamper.

作者信息

Zhou Wanting, Ye Kuo-Hui, Yuan Shiwei, Li Lei

机构信息

Research Institute of Electronic Science and Technology, University of Electronic Science and Technology of China, No. 2006, Xi Yuan Ave., West High-Tech Zone, Chengdu, 611731, Sichuan, China.

Department of Information Management, National Dong Hwa University, No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien, 97001, Taiwan (Province of China).

出版信息

Heliyon. 2023 Jun 13;9(6):e17085. doi: 10.1016/j.heliyon.2023.e17085. eCollection 2023 Jun.

DOI:10.1016/j.heliyon.2023.e17085
PMID:37360108
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10285180/
Abstract

As the core of Internet of Things (IoT), embedded processors are being used more and more extensive. However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against HT tamper is proposed, which builds two hardware-implementation units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. Once a HT tamper is detected, the two units will carry out fast recovery through rolling back to the exact PC address corresponding to the wrong instruction and resuming the instruction execution. An open RISC-V core of PULPino is adopted for recovery mechanism verification, the experimental results and hardware costs show that the proposed method could guarantee the processor restore from abnormal state in real time with a reasonable hardware overhead.

摘要

作为物联网(IoT)的核心,嵌入式处理器的应用越来越广泛。然而,嵌入式处理器面临着各种硬件安全问题,如硬件木马(HT)和代码篡改攻击。本文提出了一种针对嵌入式处理器HT篡改的周期级恢复方法,该方法构建了两个硬件实现单元,即通用寄存器(GPRs)备份单元和程序计数器回滚单元。一旦检测到HT篡改,这两个单元将通过回滚到与错误指令对应的精确程序计数器地址并恢复指令执行来进行快速恢复。采用开源的PULPino的RISC-V内核进行恢复机制验证,实验结果和硬件成本表明,该方法能够以合理的硬件开销保证处理器从异常状态实时恢复。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/857b7db97799/gr009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/730ba39bb84d/gr001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/0e47c3e48c00/gr002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/effd92164a6a/gr003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/9bf4705d1b03/gr004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/d860aee4a1cf/gr005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/65881ea215e9/gr006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/0c72c56da6dc/gr007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/dc7f7824cd67/gr008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/857b7db97799/gr009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/730ba39bb84d/gr001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/0e47c3e48c00/gr002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/effd92164a6a/gr003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/9bf4705d1b03/gr004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/d860aee4a1cf/gr005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/65881ea215e9/gr006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/0c72c56da6dc/gr007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/dc7f7824cd67/gr008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3bc3/10285180/857b7db97799/gr009.jpg

相似文献

1
A cycle-level recovery method for embedded processor against HT tamper.一种针对硬件木马的嵌入式处理器循环级恢复方法。
Heliyon. 2023 Jun 13;9(6):e17085. doi: 10.1016/j.heliyon.2023.e17085. eCollection 2023 Jun.
2
Hardware-Assisted Security Monitoring Unit for Real-Time Ensuring Secure Instruction Execution and Data Processing in Embedded Systems.用于实时确保嵌入式系统中安全指令执行和数据处理的硬件辅助安全监控单元
Micromachines (Basel). 2021 Nov 26;12(12):1450. doi: 10.3390/mi12121450.
3
An RISC-V Processor with Area-Efficient Memristor-Based In-Memory Computing for Hash Algorithm in Blockchain Applications.一种用于区块链应用中哈希算法的、具有基于忆阻器的面积高效内存计算功能的RISC-V处理器。
Micromachines (Basel). 2019 Aug 16;10(8):541. doi: 10.3390/mi10080541.
4
Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance.通过硬件辅助的轻量级方案保护嵌入式系统免受代码重用攻击。
Micromachines (Basel). 2023 Jul 29;14(8):1525. doi: 10.3390/mi14081525.
5
mIoT: Metamorphic IoT Platform for On-Demand Hardware Replacement in Large-Scaled IoT Applications.mIoT:用于大规模物联网应用中按需硬件更换的变形物联网平台。
Sensors (Basel). 2020 Jun 12;20(12):3337. doi: 10.3390/s20123337.
6
DEMIX: Domain-Enforced Memory Isolation for Embedded System.DEMIX:用于嵌入式系统的域强制内存隔离。
Sensors (Basel). 2023 Mar 29;23(7):3568. doi: 10.3390/s23073568.
7
Hardware Security of Fog End-Devices for the Internet of Things.雾端物联网设备的硬件安全。
Sensors (Basel). 2020 Oct 9;20(20):5729. doi: 10.3390/s20205729.
8
A Hardware Security Protection Method for Conditional Branches of Embedded Systems.一种针对嵌入式系统条件分支的硬件安全保护方法。
Micromachines (Basel). 2024 Jun 5;15(6):760. doi: 10.3390/mi15060760.
9
RisCO2: Implementation and Performance Evaluation of RISC-V Processors for Low-Power CO Concentration Sensing.RisCO2:用于低功耗一氧化碳浓度传感的RISC-V处理器的实现与性能评估
Micromachines (Basel). 2023 Jul 4;14(7):1371. doi: 10.3390/mi14071371.
10
An Overview of the nMPRA and nHSE Microarchitectures for Real-Time Applications.实时应用的 nMPRA 和 nHSE 微体系结构概述。
Sensors (Basel). 2021 Jun 30;21(13):4500. doi: 10.3390/s21134500.