Protecting IoT Devices through a Hardware-driven Memory Verification

Conference Paper (2021)
Author(s)

T.C. Köylü (TU Delft - Computer Engineering)

Hans Okkerman (Student TU Delft)

Cezar Rodolfo Wedig Reinbrecht (TU Delft - Computer Engineering)

S. Hamdioui (TU Delft - Quantum & Computer Engineering)

Mottaqiallah Taouil (TU Delft - Computer Engineering)

Research Group
Computer Engineering
Copyright
© 2021 T.C. Köylü, Hans Okkerman, Cezar Reinbrecht, S. Hamdioui, M. Taouil
DOI related publication
https://doi.org/10.1109/DSD53832.2021.00027
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 T.C. Köylü, Hans Okkerman, Cezar Reinbrecht, S. Hamdioui, M. Taouil
Research Group
Computer Engineering
Pages (from-to)
115-122
ISBN (print)
978-1-6654-2704-3
ISBN (electronic)
978-1-6654-2703-6
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they have become prime targets for attackers and hackers. An adequate protection against attacks is only possible when the confidentiality and integrity of the data and applications of these devices are secured. State-of-the-art solutions mostly address software and network attacks, but overlook physical/hardware attacks. Such attacks can still exploit software vulnerabilities or even introduce them. In this paper, we present embedded memory security (EMS); it protects against physical tampering of the memory of IoT devices. As a case study, we have equipped a RISC-V based system-on-chip (SoC) with an EMS module. Our experimental results show that EMS successfully can protect the SoC against hardware tampering attacks, while having a low performance overhead.

Files

Paper_no_treadmark.pdf
(pdf | 1.14 Mb)
License info not available