z-logo
open-access-imgOpen Access
The Design and Implementation of Embedded Security CPU Based on Multi‐strategy
Author(s) -
Li Dongfang,
Zhan Xin,
Tong Qiaoling,
Zou Xuecheng,
Liu Zhenglin
Publication year - 2016
Publication title -
chinese journal of electronics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.267
H-Index - 25
eISSN - 2075-5597
pISSN - 1022-4653
DOI - 10.1049/cje.2016.08.040
Subject(s) - computer science , embedded system , parallel computing , computer architecture
Control flow monitoring, information flow tracking and memory monitoring are the three main solutions to enhance the security of embedded system at the hardware architecture level. However, most of the current studies about the security of embedded system consider the above solutions in separate dimensions rather than a combined effort. We start from the operation model at the instruction level, and propose a security multi‐strategy which combines information flow tracking and memory monitoring by studying the security operating mechanism of embedded system. As a hardware approach this strategy extends the embedded processor architecture with additional security defense control. The experimental results show this multi‐strategy is more effective and can detect more malicious attacks than a single solution. The effectiveness of our proposed security multi‐strategy has been verified in a Field programmable gate array (FPGA) prototype platform based on a customized Leon3 microprocessor.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here