Font Size: a A A

The Research And Implement Of Information-Flow Monitoring Mechanism Base On The Security Of Embedded System

Posted on:2012-12-06Degree:MasterType:Thesis
Country:ChinaCandidate:B L QinFull Text:PDF
GTID:2218330362957806Subject:IC Engineering
Abstract/Summary:PDF Full Text Request
With the improving of modern intelligent level, the security of embedded systems have gradually been put on the agenda. In recent years,malicious software attacks has been a serious threat to the normal use of embedded systems, particularly viral infection,can cause the operating system error, and even can cause the system to be in paralysis. Because during the operating and running and in embedded systems the new program will be loaded into the system, for those safety procedures in the system it is a new and hidden danger, so it is necessary to take the necessary measures of information flow tracking to track the trajectory of these procedures, when the dangerous behaviors were found they are prevented. for the monitoring of malicious software behavior,from operation mode of program on the command-level and for the study of the safe operation mechanisms of the embedded system taint tracking strategy is proposed in this paper. The strategy is to add security defense control to leon3 processor architecture, and it is a hardware implementation of the information flow security monitoring strategy.This paper aiming at the security operation mechanism of embedded processor, implemented security monitoring for hidden procedures using taint tracking, thus ensuring the security of original procedures. We provided a information flow security monitoring method for embedded processors. This method includes: taint marking for attack target, taint propagation and taint checking. In processor core taint check registers were added, and when instruction was processed through pipeline, taint checking was completed using taint check registers, and threat behavior of attack source in kernel was classified into different levels. Compared with existing technology its hardware overhead was smaller and its false positive was lower, so it can achieve better performance and can really apply into high design demanding embedded processors.
Keywords/Search Tags:software attack, information flow security, taint tracking, leon3, processor architecture
PDF Full Text Request
Related items