首页> 外文期刊>Integration >iCETD: An improved tag generation design for memory data authentication in embedded processor systems
【24h】

iCETD: An improved tag generation design for memory data authentication in embedded processor systems

机译:iCETD:改进的标签生成设计,用于嵌入式处理器系统中的存储器数据认证

获取原文
获取原文并翻译 | 示例
           

摘要

Security becomes increasingly important in computing systems. Data integrity is of utmost importance. One way to protect data integrity is attaching an identifying tag to individual data. The authenticity of the data can then be checked against its tag. If the data is altered by the adversary, the related tag becomes invalid and the attack will be detected. The work presented in this paper studies an existing tag design (CETD) for authenticating memory data in embedded processor systems, where data that are stored in the memory or transferred over the bus can be tampered. Compared to other designs, this design offers the flexibility of trading-off between the implementation cost and tag size (hence the level of security); the design is cost effective and can counter the data integrity attack with random values (namely the fake values used to replace the valid data in the attack are random). However, we find that the design is vulnerable when the fake data is not randomly selected. For some data, their tags are not distributed over the full tag value space but rather limited to a much reduced set of values. When those values were chosen as the fake value, the data alteration would likely go undetected. In this article, we analytically investigate this problem and propose a low cost enhancement to ensure the full-range distribution of tag values for each data, hence effectively removing the vulnerability of the original design.
机译:安全在计算系统中变得越来越重要。数据完整性至关重要。保护数据完整性的一种方法是将识别标签附加到单个数据。然后可以根据其标签检查数据的真实性。如果对手更改了数据,则相关标签无效,并且将检测到攻击。本文介绍的工作研究了一种现有的标签设计(CETD),用于对嵌入式处理器系统中的存储器数据进行身份验证,其中可以篡改存储在存储器中或通过总线传输的数据。与其他设计相比,该设计提供了在实现成本和标签大小(因此具有安全级别)之间进行权衡的灵活性;该设计具有成本效益,并且可以使用随机值来应对数据完整性攻击(即,用于替换攻击中的有效数据的伪值是随机的)。但是,我们发现当不随机选择假数据时,设计很容易受到攻击。对于某些数据,它们的标签没有分布在整个标签值空间上,而是局限于数量减少得多的一组值。当这些值被选择为假值时,数据更改很可能不会被检测到。在本文中,我们将分析此问题,并提出一种低成本增强措施,以确保每个数据的标签值全范围分布,从而有效地消除了原始设计的脆弱性。

著录项

  • 来源
    《Integration》 |2017年第1期|96-104|共9页
  • 作者单位

    Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia;

    Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia;

    Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia;

    Univ Notre Dame, Notre Dame, IN 46556 USA;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Tag design; Memory data authentication; Low cost embedded systems;

    机译:标签设计;内存数据认证;低成本嵌入式系统;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号