A Novel Fast Recovery Method for HT Tamper in Embedded Processor

Wanting Zhou*, Shiwei Yuan, Lei Li, Kuo Hui Yeh

*此作品的通信作者

研究成果: Conference contribution同行評審

1 引文 斯高帕斯(Scopus)

摘要

Nowadays, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a novel cycle-level recovery method for HT tamper in embedded processor is proposed, which consists two units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. The former one is designed to replace original register files with backup function extra. And the latter one is composed for rollback operations based on the exact PC address corresponding to the wrong instruction. If a HT tamper is detected, the backup unit works in conjunction with PC rollback unit allowing the processor to resume the instruction execution. The proposed method has been implanted into a RISC-V core of PULpino, and the experimental results show that the processor can restore from fault state caused by inserted HT in real time with the latency of 7 clock cycles, including 2 clock cycles for detection.

原文English
主出版物標題Blockchain Technology and Emerging Technologies - 2nd EAI International Conference, BlockTEA 2022, Proceedings
編輯Weizhi Meng, Wenjuan Li
發行者Springer Science and Business Media Deutschland GmbH
頁面131-139
頁數9
ISBN(列印)9783031314193
DOIs
出版狀態Published - 2023
事件2nd EAI International Conference on Blockchain Technology and Emerging Technologies, BlockTEA 2022 - Virtual, online
持續時間: 21 11月 202222 11月 2022

出版系列

名字Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
498 LNICST
ISSN(列印)1867-8211
ISSN(電子)1867-822X

Conference

Conference2nd EAI International Conference on Blockchain Technology and Emerging Technologies, BlockTEA 2022
城市Virtual, online
期間21/11/2222/11/22

指紋

深入研究「A Novel Fast Recovery Method for HT Tamper in Embedded Processor」主題。共同形成了獨特的指紋。

引用此