Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2755753.2755781acmconferencesArticle/Chapter ViewAbstractPublication PagesdateConference Proceedingsconference-collections
research-article

Hardware-assisted code obfuscation for FPGA soft microprocessors

Published: 09 March 2015 Publication History

Abstract

Soft microprocessors are vital components of many embedded FPGA systems. As the application domain for FPGAs expands, the security of the software used by soft processors increases in importance. Although software confidentiality approaches (e.g. encryption) are effective, code obfuscation is known to be an effective enhancement that further deters code understanding for attackers. The availability of specialization in FPGAs provides a unique opportunity for code obfuscation on a per-application basis with minimal hardware overhead. In this paper we describe a new technique to obfuscate soft microprocessor code which is located outside the FPGA chip in an unprotected area. Our approach provides customizable, data-dependent control flow modification to make it difficult for attackers to easily understand program behavior. The application of the approach to three benchmarks illustrates a control flow cyclomatic complexity increase of about 7X with a modest logic overhead for the soft processor.

References

[1]
C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," University of Auckland, Technical Report, 1997.
[2]
C. Wang, "A security architecture for survivability mechanisms," Ph.D. dissertation, University of Virginia, Oct. 2000.
[3]
T. Laszlo and A. Kiss, "Obfuscating C++ programs via control flow flattening," Sectio Computatorica, Aug. 2009.
[4]
A. Majumdar, "Design and evaluation of software obfuscations," Ph.D. dissertation, Department of Computer Science, University of Auckland, New Zealand, Oct. 2008.
[5]
C. Linn and S. Debray, "Obfuscation of executable code to improve resistance to static disassembly," in ACM Conf. on Computer and Comm. Security, Oct. 2003, pp. 290--299.
[6]
D. Aucsmith, "Tamper resistant software: An implementation," in International Workshop on Information Hiding, May 1996, pp. 317--333.
[7]
P. Falcarin, R. Scandariato, and M. Baldi, "Remote trust with aspect oriented computing," in IEEE Advanced Information and Networking Applications, Apr. 2006, pp. 317--333.
[8]
B. Anckaert, M. Madou, B. D. Sutter, K. D. Bosschere, and B. Preneel, "Program obfuscation: A quantitative approach," in ACM Workshop on Quality of Protection, Oct. 2007, pp. 15--20.
[9]
S. Schrittwieser and S. Katzenbeisser, "Code obfuscation against static and dynamic reverse engineering," in International Conference on Information Hiding, 2011, pp. 270--284.
[10]
X. Zhuang, T. Zhang, H.-H. S. Lee, and S. Pande, "Hardware assisted control flow obfuscation for embedded processors," in International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, Sep. 2004, pp. 292--302.
[11]
P. Yiannacouras, J. G. Steffan, and J. Rose, "Application-specific customization of soft processor microarchitecture," in Proc. Int'l Symp. on FPGAs, Feb. 2006, pp. 201--210.
[12]
J. Crenne, R. Vaslin, G. Gogniat, J.-P. Diguet, R. Tessier, and D. Unnikrishnan, "Configurable memory security in embedded systems," ACM Transactions on Embedded Computer Systems, vol. 12, no. 3, pp. 1--25, Mar. 2013.
[13]
P. Bulens, F.-X. Standaert, J.-J. Quisquater, P. Pellegrin, and G. Rouvoy, "Implementation of the AES-128 on Virtex-5 FPGAs," in Proceedings, AFRICACRYPT, 2008, pp. 16--26.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DATE '15: Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition
March 2015
1827 pages
ISBN:9783981537048

Sponsors

Publisher

EDA Consortium

San Jose, CA, United States

Publication History

Published: 09 March 2015

Check for updates

Author Tags

  1. code obfuscation
  2. soft microprocessor

Qualifiers

  • Research-article

Conference

DATE '15
Sponsor:
  • EDAA
  • EDAC
  • SIGDA
  • Russian Acadamy of Sciences
DATE '15: Design, Automation and Test in Europe
March 9 - 13, 2015
Grenoble, France

Acceptance Rates

DATE '15 Paper Acceptance Rate 206 of 915 submissions, 23%;
Overall Acceptance Rate 518 of 1,794 submissions, 29%

Upcoming Conference

DATE '25
Design, Automation and Test in Europe
March 31 - April 2, 2025
Lyon , France

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media