In most safety-critical systems, the robustness and the confidentiality of the application code are crucial. Such code is generally stored into Non-Volatile Memories (NVMs) that are prone to faults (e.g., due to radiation effects). Unfortunately, faults affecting the instruction code result very often into Silent Data Corruption (SDC). This condition lets faults remain undetected and it can lead to undesiderable errors that may compromise the system functionality. Thus, it is desirable that the system is able to detect faults affecting the code memory. To overcome this issue, designers often resort to expensive error detection/correction mechanisms. Furthermore, they also adopt memory encryption techniques to prevent unauthorized, hence malicious, access to the code or to protect it from any unauthorized copy. In this paper, we show that the presence of memory encryption alone is able to strongly reduce the probability of SDC, without the need of implementing expensive error detection. We have performed some experiments on the OpenRISC1200 microprocessor in order to evaluate the impact on reliability stemming from different encryption methods.

Evaluating the Code Encryption Effects on Memory Fault Resilience / Cantoro, R.; Deligiannis, N.; Sonza Reorda, M.; Traiola, M.; Valea, E.. - ELETTRONICO. - (2020), pp. 1-6. (Intervento presentato al convegno 21st IEEE Latin-American Test Symposium, LATS 2020 tenutosi a Maceio, Brazil nel 30 March-2 April 2020) [10.1109/LATS49555.2020.9093670].

Evaluating the Code Encryption Effects on Memory Fault Resilience

Cantoro R.;Deligiannis N.;Sonza Reorda M.;Valea E.
2020

Abstract

In most safety-critical systems, the robustness and the confidentiality of the application code are crucial. Such code is generally stored into Non-Volatile Memories (NVMs) that are prone to faults (e.g., due to radiation effects). Unfortunately, faults affecting the instruction code result very often into Silent Data Corruption (SDC). This condition lets faults remain undetected and it can lead to undesiderable errors that may compromise the system functionality. Thus, it is desirable that the system is able to detect faults affecting the code memory. To overcome this issue, designers often resort to expensive error detection/correction mechanisms. Furthermore, they also adopt memory encryption techniques to prevent unauthorized, hence malicious, access to the code or to protect it from any unauthorized copy. In this paper, we show that the presence of memory encryption alone is able to strongly reduce the probability of SDC, without the need of implementing expensive error detection. We have performed some experiments on the OpenRISC1200 microprocessor in order to evaluate the impact on reliability stemming from different encryption methods.
2020
978-1-7281-8731-0
File in questo prodotto:
File Dimensione Formato  
PUBLISHED-09093670.pdf

non disponibili

Descrizione: final paper
Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 428.39 kB
Formato Adobe PDF
428.39 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
_LATS2020__Evaluating_the_Code_Encryption_Effects_on_Memory_Fault_Resilience.pdf

accesso aperto

Descrizione: accepted
Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 621.12 kB
Formato Adobe PDF
621.12 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2838451