Cryptology ePrint Archive: Report 2015/831
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk
Abstract: The challenges faced in securing embedded computing systems against multifaceted memory safety vulnerabilities have prompted great interest in the development of memory safety countermeasures. These countermeasures either provide protection only against their corresponding type of vulnerabilities, or incur substantial architectural modifications and overheads in order to provide complete safety, which makes them infeasible for embedded systems. In this paper, we propose M-MAP: a comprehensive system based on multi-factor memory authentication for complete memory safety, inspired by everyday user authentication factors. We examine certain crucial theoretical and practical implications of composing memory integrity verification and bounds checking protection schemes in a comprehensive system. Based on these implications, we implement M-MAP with hardware based memory integrity verification and software based bounds checking to achieve a balance between hardware modifications and performance. We demonstrate that M-MAP implemented on top of a lightweight out-of-order processor delivers complete memory safety with only $32\%$ performance overhead on average, and incurs minimal hardware modifications and area overhead.
Category / Keywords: implementation / Secure Processor, Memory Safety, Authentication, Memory Integrity, Bounds Checking
Original Publication (with major differences): IEEE International Conference on Computer Design, 2015
Date: received 26 Aug 2015
Contact author: syed haider at engr uconn edu
Available format(s): PDF | BibTeX Citation
Note: This is an extended version of the M-MAP paper published as a poster paper in IEEE International Conference on Computer Design, 2015.
Version: 20150826:175335 (All versions of this report)
Short URL: ia.cr/2015/831
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]