IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions

Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processo...

Full description

Saved in:
Bibliographic Details
Main Authors: Yuze Wang, Peng Liu, Yingtao Jiang
Format: Article
Language:English
Published: Wiley 2022-07-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12059
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processor system as flaws or vulnerabilities. To address this problem that may cause potentially serious security breaches, the instruction set architecture (ISA) monitor and secure cache (IMSC) is proposed. As a lightweight solution, IMSC employs an ISA monitor to discover and correct any potential threats imposed by undocumented instructions, and it relies on a secure cache to ensure the credibility of the system. The authors’ case studies have confirmed that IMSC can effectively protect a processor system from being exploited by undocumented instructions and thus provide a trustworthy computing environment, all at low hardware and run‐time costs.
ISSN:1751-8709
1751-8717