Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/10676
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bolata, Alperen | - |
dc.contributor.author | Tuğrul, Yahya Can | - |
dc.contributor.author | Çelik, Seyyid Hikmet | - |
dc.contributor.author | Sezer, Şakir | - |
dc.contributor.author | Ottavi, Marco | - |
dc.contributor.author | Ergin, Oğuz | - |
dc.date.accessioned | 2023-10-24T06:59:09Z | - |
dc.date.available | 2023-10-24T06:59:09Z | - |
dc.date.issued | 2023 | - |
dc.identifier.isbn | 979-8-3503-3634-4 | - |
dc.identifier.issn | 1530-1877 | - |
dc.identifier.uri | https://doi.org/10.1109/ETS56758.2023.10174063 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/10676 | - |
dc.description | 28th IEEE European Test Symposium (ETS) -- MAY 22-26, 2023 -- Venice, ITALY | en_US |
dc.description.abstract | Instruction injections or soft errors during execution on the CPU can cause serious system vulnerabilities. During the standard program flow of the processor, the injection of unauthorized instruction or the occurrence of an error in the expected instruction are the main conditions for potentially serious such vulnerabilities. With the execution of these unauthorized instructions, adversaries could exploit SoC and execute their own malicious program or get higher-level privileges on the system. On the other hand, non-intentional errors can potentially corrupt programs causing unintended executions or the cause of program crashes. Modern trusted architectures propose solutions for unauthorized execution on SoC with additional software mechanisms or extra hardware logic on the same untrusted SoC. Nevertheless, these SoCs can still be vulnerable, as long as deployed security detection mechanisms are embedded within the same SoC's fabric. Furthermore, validation mechanisms on the SoC increase the complexity and power consumption of the SoC. This paper presents DEV-PIM, a new, high-performance, and low-cost execution validation mechanism in SoCs with external DRAM memory. The proposed approach uses processingin-memory (PIM) method to detect instruction injections or corrupted instructions by utilising basic computing resources on a standard DRAM device. DEV-PIM transfers instructions scheduled for execution on the CPU to the DRAM and validates them by comparing content with the trusted program record on the DRAM using PIM operations. By optimising the DRAM scheduling process validation tasks are only executed when memory access is idle. The CPU retains uninterrupted memory access and can continue its normal program flow without penalty. We evaluate DEV-PIM in an end-to-end DRAM-compatible environment and run a set of software benchmarks. On average, the proposed architecture is able to detect 98.46% of instruction injections for different validation. We also measured on average only 0.346% CPU execution overhead with DEV-PIM enabled. | en_US |
dc.description.sponsorship | IEEE,IEEE Comp Soc,IEEE Council Electron Design Automat,IEEE Comp Soc Test Technol Tech Council,CNRS,Ecole Centrale Lyon,Politecnico Torino | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 2023 Ieee European Test Symposium, Ets | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Execution Validation | en_US |
dc.subject | DRAM | en_US |
dc.subject | Processing-in-Memory | en_US |
dc.subject | Trusted Execution | en_US |
dc.title | Dev-Pim: Dynamic Execution Validation With Processing-In | en_US |
dc.type | Conference Object | en_US |
dc.department | TOBB ETÜ | en_US |
dc.identifier.wos | WOS:001032757100024 | en_US |
dc.identifier.scopus | 2-s2.0-85166178144 | en_US |
dc.institutionauthor | … | - |
dc.identifier.doi | 10.1109/ETS56758.2023.10174063 | - |
dc.authorscopusid | 57216901758 | - |
dc.authorscopusid | 57322480300 | - |
dc.authorscopusid | 57815948000 | - |
dc.authorscopusid | 7004935772 | - |
dc.authorscopusid | 23482610400 | - |
dc.authorscopusid | 6603141208 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.