skip to main content
10.1145/2818000.2818030acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics

Authors Info & Claims
Published:07 December 2015Publication History

ABSTRACT

The FPGA world recently experienced significant changes with the introduction of new Systems-on-Chip (SoCs) embedding high-end microprocessors and programmable logic on the same integrated circuit. The architecture of these SoCs can be exploited to offer an unprecedented level of monitoring of the memory accesses of running software components, a key element of performance, safety and security analysis. This paper presents the hardware / software implementation of such a memory tracing tool on one of these SoCs. It also proposes example applications in the security field and two attacks --- a pass-phrase retrieval and an access control bypass --- to demonstrate the power of hardware-assisted memory tracing.

References

  1. Altera socs: When architecture matters: https://www.altera.com/products/soc/overview.html.Google ScholarGoogle Scholar
  2. AXI reference guide: http://www.xilinx.com/support/documentation/ip_documentation/ug761_axi_reference_guide.pdf.Google ScholarGoogle Scholar
  3. BusyBox: http://www.busybox.net.Google ScholarGoogle Scholar
  4. RAMspeed: http://alasir.com/software/ramspeed.Google ScholarGoogle Scholar
  5. Secbus, a hardware / software architecture protecting the external memories of an soc: https://secbus.telecom-paristech.fr/.Google ScholarGoogle Scholar
  6. Vivado design suite: http://www.xilinx.com/products/design-tools/vivado.html.Google ScholarGoogle Scholar
  7. Xilinx all programmable socs: http://www.xilinx.com/products/silicon-devices/soc.html.Google ScholarGoogle Scholar
  8. Zedboard community-based web site: http://zedboard.org/.Google ScholarGoogle Scholar
  9. M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. Technical report, DTIC Document, 2006.Google ScholarGoogle Scholar
  10. L. H. Crockett, R. A. Elliot, M. A. Enderwitz, and R. W. Stewart. The Zynq Book. Strathclyde Academic Media, Department of Electronic and Electrical Engineering University of Strathclyde Glasgow, Scotland, UK, 1 edition, 7 2014.Google ScholarGoogle Scholar
  11. A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: Malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS '08, pages 51--62, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. R. A. Grégio, P. L. de Geus, C. Kruegel, and G. Vigna. Tracking memory writes for malware classification and code reuse identification. In Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'12, pages 134--143, Berlin, Heidelberg, 2013. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Huang. Keeping secrets in hardware: The microsoft xbox™ ; case study. In Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES '02, pages 213--227, London, UK, UK, 2003. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Laing, M. E. Locasto, and J. Aycock. An experience report on extracting and viewing memory events via wireshark. In 8th USENIX Workshop on Offensive Technologies (WOOT 14), San Diego, CA, 2014. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. G. S. Lloyd, K. Y. Cheng, and M. B. Gokhale. Real-time FPGA-based Capture of Memory Traces with Application to Active Memory Emulation. Aug 2014.Google ScholarGoogle Scholar
  16. N. Nethercote and J. Seward. Valgrind: A framework for heavyweight dynamic binary instrumentation. In In Proceedings of the 2007 Programming Language Design and Implementation Conference, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Payer, E. Kravina, and T. R. Gross. Lightweight memory tracing. In Presented as part of the 2013 USENIX Annual Technical Conference (USENIX ATC 13), pages 115--126, San Jose, CA, 2013. USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. L. Petroni, J. Timothy, F. Jesus, M. William, and A. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In In Proceedings of the 13th USENIX Security Symposium, pages 179--194, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. TRustworthy Embedded Systems for Secure Cloud Computing Applications. Secure cloud computing applications secure cloud computing applications (trescca). http://www.trescca.eu/.Google ScholarGoogle Scholar
  20. R. P. Weicker. Dhrystone: A synthetic systems programming benchmark. Commun. ACM, 27(10):1013--1030, Oct. 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. Yin and D. Song. Automatic Malware Analysis: An Emulator Based Approach. Springer Publishing Company, Incorporated, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pages 116--127, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ACSAC '15: Proceedings of the 31st Annual Computer Security Applications Conference
              December 2015
              489 pages
              ISBN:9781450336826
              DOI:10.1145/2818000

              Copyright © 2015 ACM

              Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 7 December 2015

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate104of497submissions,21%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader