Hash Attacks Prevention for Instruction Security in Embedded Monitoring System

Xiang WANG, Zhan-Hong HE, Yang XU, Shu-Song PANG, Xiao-Cui WANG, Cheng ZHOU, Pei DU

Abstract


Embedded security monitoring module is a dedicated hardware that runs parallel with the embedded processor, which is used to monitor the integrity of the data and code to enhance program execution security of embedded system. It uses hardware-supported methods computing a hash value of instructions with the hash algorithm as an official reference value to prevent malicious attacks on the program code. This paper analyzed possible hash algorithm attacks on instructions, and did the prevention research for the most effective attack, the Rainbow table. In this paper we designed a protection mechanism by adding the interference information to each of instructions, making the attacker’s burden greatly increase, so as to enhance the security of monitoring model, and to achieve protection of instruction information.

Keywords


Embedded system, Hash algorithm, Instruction protection

Publication Date


2016-11-30 00:00:00


DOI
10.12783/dtetr/ssme-ist2016/4025

Refbacks

  • There are currently no refbacks.