A Novel Fast Recovery Method for HT Tamper in Embedded Processor

Wanting Zhou*, Shiwei Yuan, Lei Li, Kuo Hui Yeh

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Nowadays, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a novel cycle-level recovery method for HT tamper in embedded processor is proposed, which consists two units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. The former one is designed to replace original register files with backup function extra. And the latter one is composed for rollback operations based on the exact PC address corresponding to the wrong instruction. If a HT tamper is detected, the backup unit works in conjunction with PC rollback unit allowing the processor to resume the instruction execution. The proposed method has been implanted into a RISC-V core of PULpino, and the experimental results show that the processor can restore from fault state caused by inserted HT in real time with the latency of 7 clock cycles, including 2 clock cycles for detection.

Original languageEnglish
Title of host publicationBlockchain Technology and Emerging Technologies - 2nd EAI International Conference, BlockTEA 2022, Proceedings
EditorsWeizhi Meng, Wenjuan Li
PublisherSpringer Science and Business Media Deutschland GmbH
Pages131-139
Number of pages9
ISBN (Print)9783031314193
DOIs
StatePublished - 2023
Event2nd EAI International Conference on Blockchain Technology and Emerging Technologies, BlockTEA 2022 - Virtual, online
Duration: 21 Nov 202222 Nov 2022

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume498 LNICST
ISSN (Print)1867-8211
ISSN (Electronic)1867-822X

Conference

Conference2nd EAI International Conference on Blockchain Technology and Emerging Technologies, BlockTEA 2022
CityVirtual, online
Period21/11/2222/11/22

Keywords

  • embedded processor
  • fault recovery
  • GPRs
  • hardware security

Fingerprint

Dive into the research topics of 'A Novel Fast Recovery Method for HT Tamper in Embedded Processor'. Together they form a unique fingerprint.

Cite this