Protecting IoT Devices through a Hardware-driven Memory Verification

Troya Çağıl Köylü, Hans Okkerman, Cezar Rodolfo Wedig Reinbrecht, Said Hamdioui, Mottaqiallah Taouil

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

99 Downloads (Pure)

Abstract

Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they have become prime targets for attackers and hackers. An adequate protection against attacks is only possible when the confidentiality and integrity of the data and applications of these devices are secured. State-of-the-art solutions mostly address software and network attacks, but overlook physical/hardware attacks. Such attacks can still exploit software vulnerabilities or even introduce them. In this paper, we present embedded memory security (EMS); it protects against physical tampering of the memory of IoT devices. As a case study, we have equipped a RISC-V based system-on-chip (SoC) with an EMS module. Our experimental results show that EMS successfully can protect the SoC against hardware tampering attacks, while having a low performance overhead.
Original languageEnglish
Title of host publication2021 24th Euromicro Conference on Digital System Design (DSD)
Subtitle of host publicationProceedings
EditorsL. O'Conner
Place of PublicationPiscataway
PublisherIEEE
Pages115-122
Number of pages8
ISBN (Electronic)978-1-6654-2703-6
ISBN (Print)978-1-6654-2704-3
DOIs
Publication statusPublished - 2021
Event2021 24th Euromicro Conference on Digital System Design (DSD) - Virtual at Palermo, Spain
Duration: 1 Sept 20213 Sept 2021

Conference

Conference2021 24th Euromicro Conference on Digital System Design (DSD)
Abbreviated titleDSD 2021
Country/TerritorySpain
CityVirtual at Palermo
Period1/09/213/09/21

Bibliographical note

Accepted author manuscript

Keywords

  • IoT
  • external memory protection
  • confidentiality
  • integrity
  • hardware security

Fingerprint

Dive into the research topics of 'Protecting IoT Devices through a Hardware-driven Memory Verification'. Together they form a unique fingerprint.

Cite this