Skip to content

Security mechanism in hardware that enforces CFI.

Notifications You must be signed in to change notification settings

luiscarlos63/Zero_Risc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

46 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Zero_Risc

Zero Risc is a security driven hardware module writen in Verilog. This module implements an hardware-base Control Flow Integrity for a target RISC-V soft CPU core. The used core is call Simple System developed by Ibex.

This project emerged from a college proposed project topic, which itself came from the RISC-V Soft CPU Security Contest by Thales and Microchip Technology https://github.com/ThalesGroup/RISC-V-IoT-Contest

Objectives

The main goal is to implement security mechanisms for a target FPGA platform integrating an already developed RISC-V soft CPU core solely by extending the processor. The security countermeasures must be designed to thwart classical software attacks:

  • i. Corrupting a function pointer on the heap
  • ii. Buffer overflow on the stack to corrupt longjump buffer
  • iii. Buffer overflow on the stack to change the return address
  • iv. Corrupting a function pointer on the stack
  • v. Corrupting a C structure holding a function pointer

Design

Table - CFG

Zero_Risc Control flow graph is represent using a table that stores information about the jump intructions and the adress to where that jump can branch.

CFG table

Filling example:

CFG table_ex

Decoder

The decoder submodule is responsible for comparing the current program counter with all Jump_Address in the table, in order to evaluate if the current instruction is a jump instruction.
If it detects a jump, the decoder will compare, for each match (the same jump instruction can have multiple addresses to where it can branch), is the corresponding Jump_to_Address is valid. If the correct next program counter is what is expected then there will be a match. In case a match hasn’t occurred, means that the program’s flow was hijacked.

Zero_Risc_decoder

Zero_Risc module

Zero_Risc_module

Tipical system overview

overview

User Guide

Currently, Zero Risc works as a proof of concept. This means that for it to work you need to hardcode the table before deploying it to the FPGA.

This module can be used simply by adding it to your project a submodule. Then you need just to connect:

  • i_clk to provide a clock
  • i_rst as reset (synchornous positive reset)
  • i_instr_addr to the Instruction Address (PC) register
  • o_signal to an IRQ of your system, and write your interrupt responce routine

Usage

Zero Risc rsourse usage (using 32 entry CFG table

Resource Name Zero Risc Ibex Relative Utilization
Slice LUTs 41 2557 1.57
Slice Registers 92 996 8,46
Slice 29 801 3,49
LUT as Logic 41 2509 1,60
F7 Muxes 0 2 0
LUT as Memory 0 48 0
Block Ram Tile 0 16 0
DSPs 0 1 0
Bonded IOB 0 31 0
BUFGCTRL 0 4 0
PLLE2_ADV 0 1 0

The Repository is organized as follows:

Verilog - HDL for the Zero Risc module

Sim - HDL for the Zero Risc module simulation

Ibex - Link to the Ibex repository

To do

  • Loader module to load the CFG table. This is currently being done by hardcoding in the Verilog code
    l

About

Security mechanism in hardware that enforces CFI.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published