IET Information Security (Jul 2022)

IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions

  • Yuze Wang,
  • Peng Liu,
  • Yingtao Jiang

DOI
https://doi.org/10.1049/ise2.12059
Journal volume & issue
Vol. 16, no. 4
pp. 314 – 319

Abstract

Read online

Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processor system as flaws or vulnerabilities. To address this problem that may cause potentially serious security breaches, the instruction set architecture (ISA) monitor and secure cache (IMSC) is proposed. As a lightweight solution, IMSC employs an ISA monitor to discover and correct any potential threats imposed by undocumented instructions, and it relies on a secure cache to ensure the credibility of the system. The authors’ case studies have confirmed that IMSC can effectively protect a processor system from being exploited by undocumented instructions and thus provide a trustworthy computing environment, all at low hardware and run‐time costs.

Keywords