Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V

Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V

Abstract

This study proposes a novel multi-level granularity Information Flow Tracking (IFT) model designed specifically for the RISC-V architecture to enhance runtime security and system integrity. The approach integrates hardware-based IFT with a Gate-Level IFT (GLIFT) technique, balancing flexibility and precision while overcoming the inherent resource consumption issues of prior schemes. By employing 1-bit tags and optimized shadow logic that tracks data only in security-critical modules, the model effectively eliminates area overhead and provides accurate flow assessment without false conservative results.

Report

Key Highlights

  • Novel Security Model: Introduces a multi-level granularity Information Flow Tracking (IFT) model for RISC-V to protect system integrity from untrusted channels.
  • Integrated Architecture: Combines traditional hardware-based IFT with Gate-Level IFT (GLIFT) to achieve superior precision and flexibility.
  • Optimized Overhead: Utilizes optimized shadow logic that only tracks data for security-critical modules, thus eliminating significant area overhead.
  • Precision Improvement: Implements an enhanced tagged mechanism using minimal 1-bit tags to improve precision logic without massive resource cost.

Technical Details

  • Target Architecture: Reduced Instruction Set Architecture (RISC-V).
  • Core Method: IFT technique integrated across two levels of granularity (hardware and gate-level).
  • Granularity Translation: Translation of information flow moves from the instruction level down to the data level, triggered by module instantiation associated with security-critical data.
  • Tagging Scheme: Relies on 1-bit tags for efficient tagging and tracking of sensitive data.
  • Verification Method: The model is demonstrated via a simulation-based IFT model that translates architecture-specific extensions into a compiler-specific simulation model using RISC-V toolchain extensions.

Implications

  • Enhanced RISC-V Security: Provides a robust solution for securing RISC-V cores, which is increasingly critical given the architecture's use across devices and the integration of untrusted third-party IP.
  • Solving the IFT Trade-off: Successfully addresses the long-standing challenge of balancing the resource demands of fine-grained IFT with the low precision of coarse-grained IFT models.
  • Practical Deployment: The optimized shadow logic ensures that the high precision gained by integrating GLIFT does not render the technique impractical due to overwhelming hardware overhead, making it suitable for real-world embedded systems.
  • Runtime Protection: Enables crucial runtime security assessments by accurately tracking data flow from potentially malicious or untrusted communication channels, mitigating threats like fault injection and privacy invasion.
lock-1

Technical Deep Dive Available

This public summary covers the essentials. The Full Report contains exclusive architectural diagrams, performance audits, and deep-dive technical analysis reserved for our members.

Read Full Report →