Abstract Recently released Intel processors have been equipped with hardware instruction tracing facilities to securely and efficiently record the program execution path. In this paper, we study a case for data integrity checking based on Intel Processor Trace (Intel PT), the instruction tracing facility on x86 processors. We incorporate software instrumentation and hardware instruction tracing to guarantee fine-grained data integrity without frequently switching the processor mode. We incorporate the idea in a system named DTrace which provides primitives to instruct Intel PT to capture the data load and store events, even current Intel PT implementations only record control transfers. The trace is analyzed before the program makes securit...
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively i...
Current taint checking architectures monitor tainted data usage mainly with control transfer instruc...
Capturing program and data traces during program execution unobtrusively on-the-fly is crucial in de...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
International audienceIn the last few decades embedded processors have invaded the modern lifestyle....
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
Instruction-grain program monitoring tools, which check and analyze executing programs at the granul...
International audienceThe FPGA world recently experienced significant changes with the introduction ...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively i...
Current taint checking architectures monitor tainted data usage mainly with control transfer instruc...
Capturing program and data traces during program execution unobtrusively on-the-fly is crucial in de...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
International audienceIn the last few decades embedded processors have invaded the modern lifestyle....
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Security is emerging as an important concern in embedded system design. The security of embedded sys...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to ...
Instruction-grain program monitoring tools, which check and analyze executing programs at the granul...
International audienceThe FPGA world recently experienced significant changes with the introduction ...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively i...
Current taint checking architectures monitor tainted data usage mainly with control transfer instruc...
Capturing program and data traces during program execution unobtrusively on-the-fly is crucial in de...