ARMHEx: A hardware extension for DIFT on ARM-based SoCs

Abstract : Security is a major issue nowadays for the embedded systems community. Untrustworthy authorities may use a wide range of attacks in order to retrieve critical information. This paper introduces ARMHEx, a practical solution targeting DIFT (Dynamic Information Flow Tracking) on ARM-based SoCs (e.g. Xilinx Zynq). Current DIFT implementations suffer from two major drawbacks. First, recovering required information for DIFT is generally based on software instrumentation leading to high time overheads. ARMHEx takes profit of ARM CoreSight debug components and static analysis to drastically reduce instrumentation time overhead (up to 90% compared to existing works). Then, security of the DIFT hardware extension itself is not considered in related works. In this work, we tackle this issue by proposing a solution based on ARM Trustzone.
Complete list of metadatas

Cited literature [21 references]  Display  Hide  Download
Contributor : Muhammad Abdul Wahab <>
Submitted on : Friday, July 7, 2017 - 5:19:37 PM
Last modification on : Tuesday, November 12, 2019 - 3:58:58 PM
Long-term archiving on : Wednesday, January 24, 2018 - 10:16:30 PM


Files produced by the author(s)


  • HAL Id : hal-01558473, version 1


Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, et al.. ARMHEx: A hardware extension for DIFT on ARM-based SoCs. Field Programmable Logic (FPL), Sep 2017, Ghent, Belgium. ⟨hal-01558473⟩



Record views


Files downloads