Hash Attacks Prevention for Instruction Security in Embedded Monitoring System
Abstract
Embedded security monitoring module is a dedicated hardware that runs parallel with the embedded processor, which is used to monitor the integrity of the data and code to enhance program execution security of embedded system. It uses hardware-supported methods computing a hash value of instructions with the hash algorithm as an official reference value to prevent malicious attacks on the program code. This paper analyzed possible hash algorithm attacks on instructions, and did the prevention research for the most effective attack, the Rainbow table. In this paper we designed a protection mechanism by adding the interference information to each of instructions, making the attacker’s burden greatly increase, so as to enhance the security of monitoring model, and to achieve protection of instruction information.
Keywords
Embedded system, Hash algorithm, Instruction protection
Publication Date
DOI
10.12783/dtetr/ssme-ist2016/4025
10.12783/dtetr/ssme-ist2016/4025
Refbacks
- There are currently no refbacks.