HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software...

56
HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet , Pascal Cotret β CentraleSup´ elec, [email protected] β R&D engineer, [email protected] June 22, 2018 1 / 45

Transcript of HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software...

Page 1: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

HardBlare, a hardware/software co-design approach forInformation Flow Control

Guillaume Hiet ↵, Pascal Cotret �

↵ CentraleSupelec, [email protected]� R&D engineer, [email protected]

June 22, 2018

1 / 45

Page 2: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

HardBlare projectStarted in October 2015.

Partners (all from Brittany !)

IETR/CentraleSupelec (SCEE) @ RennesPascal Cotret (Ass. Prof.) now engineer at ThalesMuhammad Abdul Wahab (PhD student)

IRISA/CentraleSupelec/Inria (CIDRE) @ RennesGuillaume Hiet (Ass. Prof.)Mounir Nasr Allah (PhD student)

Lab-STICC/UBS @ LorientGuy Gogniat (Full Prof.), Vianney Lapotre (Ass. Prof.)Arnab Kumar Biswas (Postdoc)

What do we do in this project ?

Hardware extensions for DIFT/DIFC (Dynamic Information FlowTracking / Dynamic Information Flow Control) on embeddedprocessors

2 / 45

Page 3: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Threat model

Side-channel attacks not taken into account

Software attacks: bu↵er overflow, ROP. . .

3 / 45

Page 4: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Dynamic Information Flow Tracking

Motivation

DIFT for security purposes : Integrity and Confidentiality

DIFT principle

We attach labels called tags to containers and specify an informationflow policy, i.e. relations between tags

At runtime, we propagate tags to reflect information flows that occurand detect any policy violation

4 / 45

Page 5: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

DIFT Example: Memory corruptionAttacker overwrites return address and takes control

int idx = tainted_input; //stdin (> BUFFER SIZE)

buffer[idx] = x; // buffer overflow

set r1 &tainted inputload r2 M[r1]add r4 r2 + r3store M[r4] r5

pseudo-code

T Datar1

r2

r3:&buffer

r4

r5:x

Registers

T DataReturn Address

int bu↵er[Size]

Memory5 / 45

Page 6: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

DIFT Example: Memory corruptionAttacker overwrites return address and takes control

int idx = tainted_input; //stdin (> BUFFER SIZE)

buffer[idx] = x; // buffer overflow

set r1 &tainted inputload r2 M[r1]add r4 r2 + r3store M[r4] r5

pseudo-code

T Datar1:&input

r2

r3:&buffer

r4

r5:x

Registers

T DataReturn Address

int bu↵er[Size]

Memory5 / 45

Page 7: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

DIFT Example: Memory corruptionAttacker overwrites return address and takes control

int idx = tainted_input; //stdin (> BUFFER SIZE)

buffer[idx] = x; // buffer overflow

set r1 &tainted inputload r2 M[r1]add r4 r2 + r3store M[r4] r5

pseudo-code

T Datar1:&input

r2:idx=input

r3:&buffer

r4

r5:x

Registers

T DataReturn Address

int bu↵er[Size]

Memory5 / 45

Page 8: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

DIFT Example: Memory corruptionAttacker overwrites return address and takes control

int idx = tainted_input; //stdin (> BUFFER SIZE)

buffer[idx] = x; // buffer overflow

set r1 &tainted inputload r2 M[r1]add r4 r2 + r3store M[r4] r5

pseudo-code

T Datar1:&input

r2:idx=input

r3:&buffer

r4

r5:x

Registers

T DataReturn Address

int bu↵er[Size]

Memory5 / 45

Page 9: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

DIFT Example: Memory corruptionAttacker overwrites return address and takes control

int idx = tainted_input; //stdin (> BUFFER SIZE)

buffer[idx] = x; // buffer overflow

set r1 &tainted inputload r2 M[r1]add r4 r2 + r3store M[r4] r5

pseudo-code

T Datar1:&input

r2:idx=input

r3:&buffer

r4:&buffer+idx

r5:x

Registers

T DataReturn Address

int bu↵er[Size]

Memory5 / 45

Page 10: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Di↵erent Types of Information Flows

S = secret_input()

A = S

print(A)

if A == "secret"

B = FalseC = False

B = True

print(B)print(C)

C = True

True

False

Expliciy flows

Implicit flows

6 / 45

Page 11: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Di↵erent Types of Information Flows

S = secret_input()

A = S

print(A)

if A == "secret"

B = FalseC = False

B = True

print(B)print(C)

C = True

True

False

Expliciy flows

Direct Implicit flows

Executed branch

Indirect Implicit flows

6 / 45

Page 12: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Di↵erent levels for DIFT

Fine-grained (processor level)

containers = addresses and registers

Medium-grained (language level)

containers = variables

Coarse-grained (operating system level)

containers = files,memory pages

7 / 45

Page 13: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

OS-level Software DIFC (coarse-grained)Description

Monitor is implemented within the OS kernel

Information flows = system calls

Related Work

Dedicated OS1 : Asbestos, HiStar, Flume

Modification of existing OS : Blare2

Pros & Cons

+ Small runtime overhead (< 10%)

+ Kernel space isolation (hardware support) helps protecting the monitor

- Overapproximation issue

1Efstathopoulos et al. 2005; Zeldovich et al. 2006; Krohn et al. 2007.2Geller et al. 2011; Hauser et al. 2012. 8 / 45

Page 14: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Blare: Tainting Information at the OS Level

Information tags

Contain meta-information, describing content

Updated after each information flow to describe the new content

They trace the origin of the content

php.ini

index.php/usr/bin/php site.db

{1}

{2}

{} {}

9 / 45

Page 15: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Blare: Tainting Information at the OS Level

Information tags

Contain meta-information, describing content

Updated after each information flow to describe the new content

They trace the origin of the content

php.ini

index.php/usr/bin/php site.db

{1}

{2}

{1} {}{}

9 / 45

Page 16: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Blare: Tainting Information at the OS Level

Information tags

Contain meta-information, describing content

Updated after each information flow to describe the new content

They trace the origin of the content

php.ini

index.php/usr/bin/php site.db

{1}

{2}

{}{1,2}

9 / 45

Page 17: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Blare: Tainting Information at the OS Level

Information tags

Contain meta-information, describing content

Updated after each information flow to describe the new content

They trace the origin of the content

php.ini

index.php/usr/bin/php site.db

{1}

{2}

{1,2} {1,2}

9 / 45

Page 18: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Blare: Controlling Information Flows at the OS Level

Policy tags

Contain meta-information, describing the legal content of thecontainers

It is set beforehand and doesn’t change

It is checked after each information flow and an alert is raised if thenew content is not legal

php.ini

index.php/usr/bin/php site.db

{1}

{2}

{1,2} {1,2}

{{1}}

{{2}}{{1,2}}

{{1},{2}}

10 / 45

Page 19: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Overapproximation Issue

KBlare considers processes as black boxes, so outputs are seen as a mix ofall inputs. If we execute the code below:

f1 = open(’file1’, ’r’)

f2 = open(’file2’, ’w’)

f2.write(f1.read())

f3 = open(’file3’, ’r’)

f4 = open(’file4’, ’w’)

f4.write(f3.read())

then:tags(f2) = tags(f1)tags(f4) = tags(f1)

Stags(f3)

This is obviously an overapproximation due to the black box approach.

11 / 45

Page 20: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Application-level Software DIFC (medium and fine-grained)Description

Monitors are implemented within each application

Information flows = a↵ectations + conditional branching

Related Work

Machine code3

Specific language4

Pros & Cons

+ Gain in precision (hybrid analysis, SME, faceted values)

- Huge overhead (x3 to x37)

- Few or no isolation : the monitor needs to protect itself

3Newsome and Song 2005; Harris, Jha, and Reps 2010.4Chandra and Franz 2007; Nair et al. 2007. 12 / 45

Page 21: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Hardware-based DIFT (fine-grained)

Figure: In-core DIFT 5 Figure: Dedicated CPU for DIFT 6

5Dalton, Kannan, and Kozyrakis 2007.6Nagarajan et al. 2008.

13 / 45

Page 22: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Hardware-based DIFT (fine-grained)

Figure: Dedicated DIFT co-processor 7

7Kannan, Dalton, and Kozyrakis 2009.14 / 45

Page 23: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Fine-grained DIFT : comparison of the existing approaches

Advantages Disadvantages

SoftwareFlexible security policies Runtime overhead

(from 300% to 3700%)

HW-assisted In-core DIFT Low overhead (<10%)

Invasive modificationsFew security policies

Dedicated CPU for DIFTLow overhead (<10%) Wasting resources

Few modifications to CPU Energy consumption (x 2)Flexible security policies Communication

Low runtime overhead (<10%) between CPU and DIFTDedicated DIFT coprocessorCPU not modified Coprocessor

15 / 45

Page 24: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

HardBlare approach

Objectives

Combine hardware level and OS level approaches

Design and implement a realistic proof-of-conceptUnmodified (ASIC) main CPU (related work rely on softcores)Dedicated DIFT coprocessor on FPGARely on existing OS and applications (Linux system)

Technological choices

Xilinx Zynq SoC (2 cores ARM Cortex A9 + FPGA)

Dedicated Linux distribution using Yocto

Challenge

Semantic gap : limited visibility of CPU instructions on FPGA side

16 / 45

Page 25: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

What can I do with my processor?

CoreSight: debug components

Available in most of Cortex-A +Cortex-M3 (for ARM)

Can export debug-related infos

17 / 45

Page 26: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

CoreSight components

18 / 45

Page 27: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

PTM Traces

CPU Cortex-A9

DIFT Monitor

PTM

Traces

PFT Decoder

(basic block addresses)

DIFT Core

System RAM

19 / 45

Page 28: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

PTM Traces

20 / 45

Page 29: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Static Analysis

Problem

We need to know what’s happened between two jumps

Solution

During compilation we also generate annotations that will be executed bythe co-processor to propagate tags

Examples :

add r0, r1, r2 ) r0 r1 [ r2

and r3, r4, r5 ) r3 r4 [ r5

21 / 45

Page 30: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Static Analysis

CPU Cortex-A9

DIFT Monitor

PTM

User application

Annotations

Traces

PFT Decoder

Memory tags

Tag Register File

(basic block addresses)

DIFT Core

System RAM

Clang/LLVMSource code

22 / 45

Page 31: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Instrumentation

Some addresses are resolved/calculated at run-time :Solution : instrument the code

The instrumentation is done during the last phase of thecompilation process.

The register r9 is dedicated for the instrumentation.

The instrumentation FIFO address is retrieved via a UIO Driver.

Examples :

ldr r0, [r2] ) str r2, [r9]ldr r0, [r2]

str r3, [r4] ) str r5, [r9]str r3, [r5]

23 / 45

Page 32: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Instrumentation

CPU Cortex-A9

DIFT Monitor

PTM

User application

Annotations

Instrumentation

Traces

PFT Decoder

Memory tags

Instrumentation FIFO

Tag Register File

(basic block addresses)

(load/store adresses)DIFT Core

System RAM

Clang/LLVMSource code

24 / 45

Page 33: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

RfBlare: System calls

Problem: We want to transmit tags from/to the operating system.Solution: Linux Security Modules Hooks

Problem: We want to persistently store tags in the system.Solution: Extended file attributes

When reading data from a file.We are propagating the tag of the read file to the destinationbu↵er.

When writing data to a file.We are propagating the tag of the source bu↵er to the destinationfile.

25 / 45

Page 34: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

RfBlare: System calls

CPU Cortex-A9

DIFT Monitor

PTM

User application

Annotations

Instrumentation

System calls

Traces

tag(file) ! tag(memory)

HardDrive (file system with extended attributes)passwd.txtTag:

index.htmlTag:

PFT Decoder

Memory tags

Instrumentation FIFO

Tag Register File

Linux Kernel with information flow support (RfBlare)

(basic block addresses)

(load/store adresses)

tag(memory) ! tag(file)

DIFT Core

System RAM

Clang/LLVMSource code

26 / 45

Page 35: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Overall architecture of the DIFT monitor

DIFT Coprocessor

Decodedtrace

memory

Tag annotations(64 MB)

Tag memory(64 MB)

ARM Cortex-A9

PFT decoder

trace

Interrupt

CPU memory (384 MB)

TMMU

AXI

Developed Adapted Reused

DDR

AXI Master

Custom interface

AXIinterconnect

InstrumentationRFBlare PS2PL

RFBlare PL2PS

Process mappings

27 / 45

Page 36: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

What does a trace looks like?

Code Source

int i;

for (i = 0; i < 10; i++)

Assembly8638 for loop:

. . .b 8654:. . .866c: bcc 8654

Trace00 00 00 00 00 80 08 38 86 00 0021 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a86 01 00 00 00 00 00 00 00 00

Decoded TraceA-syncAddress 00008638, (I-sync Con-text 00000000, IB 21)Address 00008654, Branch Ad-dress packet (x 10)

28 / 45

Page 37: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

What does a trace looks like?

Code Source

int i;

for (i = 0; i < 10; i++)

Assembly8638 for loop:

. . .b 8654:. . .866c: bcc 8654

Trace00 00 00 00 00 80 08 38 86 00 0021 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a86 01 00 00 00 00 00 00 00 00

Decoded TraceA-syncAddress 00008638, (I-sync Con-text 00000000, IB 21)Address 00008654, Branch Ad-dress packet (x 10)

28 / 45

Page 38: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

What does a trace looks like?

Code Source

int i;

for (i = 0; i < 10; i++)

Assembly8638 for loop:

. . .b 8654:. . .866c: bcc 8654

Trace00 00 00 00 00 80 08 38 86 00 0021 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a86 01 00 00 00 00 00 00 00 00

Decoded TraceA-syncAddress 00008638, (I-sync Con-text 00000000, IB 21)Address 00008654, Branch Ad-dress packet (x 10)

28 / 45

Page 39: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

What does a trace looks like?

Code Source

int i;

for (i = 0; i < 10; i++)

Assembly8638 for loop:

. . .b 8654:. . .866c: bcc 8654

Trace00 00 00 00 00 80 08 38 86 00 0021 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a86 01 00 00 00 00 00 00 00 00

Decoded TraceA-syncAddress 00008638, (I-sync Con-text 00000000, IB 21)Address 00008654, Branch Ad-dress packet (x 10)

28 / 45

Page 40: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

What does a trace looks like?

Decoded TraceA-syncAddress 00008638, (I-sync Con-text 00000000, IB 21)Address 00008654, Branch Ad-dress packet (x 10)

29 / 45

Page 41: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Dedicated DIFT coprocessor

1 2

DIFT Coprocessor

3

Dispatcher

Tag Management Core(TMC)

Annotationsmemory

Tagmemory

TagRR T1,T2

BRAM DDR

Tagannotations

DDR

Decoded trace

memory

BRAM

30 / 45

Page 42: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Internal structure of the DIFT coprocessor

Decode

RegisterFile (RF)

TRF

Decode

Fetchinstruction

ALU

Tag ALU

WriteBack

Fetchannotation

TRF_FP

GRF

Memoryaccess

Tag MemoryAccess

WriteBack

TPR

Dispatcher

TMC

TCRTag check

TMMU

31 / 45

Page 43: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Extension for 2 threads - DIFT coprocessor

TMC(thread 2)

Decoded trace

memoryDispatcher

Tagmemory

DDR

Tag annotations

DDR

Tagmemory

DDRBRAM

Annotationsmemory

BRAM

TMC(thread 1)

Annotationsmemory

TagRR T1,T2

TagTRI T3,#4

32 / 45

Page 44: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Extension for 2 threads - Trace details

Decoded trace000105740001042800010584000103c800010598000103f8000105740001042800010584

00 00 00 00 00 80 08 74 05 01 00 21 42 d2 04 0095 04 08 84 05 01 00 21 42 d2 04 00 e5 03 08 9805 01 00 21 42 d2 04 00 fd 03 08 74 05 01 00 2142 d3 04 00 95 04 08 84 05 01 00 21 42 d3 04 00

Trace

A-sync I-sync Branch address packet

Context ID0004d2 420004d2 420004d2 420004d2 420004d2 420004d2 420004d3 420004d3 420004d3 42

Stored address 00010574 00010428 00010584 000103c8 00010598 000103f8 00010575 00010429 00010585

33 / 45

Page 45: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Overall architecture of the DIFT monitor

DIFT Coprocessor

Decodedtrace

memory

Tag annotations(64 MB)

Tag memory(64 MB)

ARM Cortex-A9

PFT decoder

trace

Interrupt

CPU memory (384 MB)

TMMU

AXI

Developed Adapted Reused

DDR

AXI Master

Custom interface

AXIinterconnect

InstrumentationRFBlare PS2PL

RFBlare PL2PS

Process mappings

34 / 45

Page 46: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Area results (single-thread implementation)

IP Name Slice LUTs (in %) Slice Registers (in %) BRAM TileDispatcher 2223 (4.18%) 1867 (1.75%) 3TMC 1837 (3.45%) 2581 (2.43%) 6PFT Decoder 121 (0.23%) 231 (0.22%) 0Instrumentation 676 (1.27%) 2108 (1.98%) 0Blare PS2PL 662 (1.24%) 2106 (1.98%) 0Blare PL2PS 62 (0.12%) 56 (0.05 %) 0Decoded trace memory 0 0 2AXI Master 858 (1.61%) 2223 (2.09 %) 0TMMU 295 (0.55%) 112(0.10 %) 3AXI Interconnect 2733 (5.14%) 2495 (2.34 %) 0Miscellaneous 1381 (2.6%) 2160 (2.03%) 0Total Design 10848 (20.39%) 15939 (14.98%) 14 (10%)Total Available 53200 106400 140

35 / 45

Page 47: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Memory footprint

0.9

0.95

1

1.05

1.1

1.15

1.2

choleski crc dft fft fir lu matrix nbody radix wht

Nor

mal

ized

Mem

ory

Spa

ce o

verh

ead

OriginalStrategy 1Strategy 2

1 1 1 1 1 1 1 1 1 1

1.11

1.08

1.13

1.15

1.07

1.10

1.08

1.12

1.08 1.08

1.031.02

1.07

1.03 1.03 1.03 1.031.04

1.03 1.03

36 / 45

Page 48: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Some latency results

0

5

10

15

20

25

30

35

choleski crc dft fft fir lu matrix nbody radix

Nor

mal

ized

Exe

cutio

n Ti

me

OriginalRelated work

Strategy 1Strategy 2

1 1 1 1 1 1 1 1 1

9.56

11.41

3.64 3.73

1.50

34.52

28.99

10.1711.60

2.84 2.311.67 1.67 1.13

7.187.96

2.52 2.92

Quick note

Enabling CoreSight components ) Nearly no cost in terms of latency.Latency is only due to DIFT-related computations.

37 / 45

Page 49: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Comparison with existing works

Approaches Kannan 8 Deng 9 Heo 10 Wahab 11 Latest workHardcore portability No No Yes Yes YesMain CPU Softcore Softcore Softcore Hardcore HardcoreCommunication overhead N/A N/A 60% 5.4% 335%Library instrumentation N/A N/A partial No YesAll information flows Yes Yes No No YesArea overhead 6.4% 14.8% 14.47% 0.47% 0.95 %Power overhead N/A 6.3% 24% 16% 16.2%Max frequency N/A 256 MHz N/A 250 MHz 250 MHzFP support No No No No YesMulti-threaded support No No No No Yes

8Kannan, Dalton, and Kozyrakis 2009.9Deng and Suh 2012.

10Heo et al. 2015.11Wahab et al. 2017.

38 / 45

Page 50: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Perspectives

Take away:

CoreSight PTM allows to obtain runtime information (Program Flow)

Non-intrusive tracing ) Negligible performance overhead

Support for multi-threaded and floating-point software

Kernel support with RfBlare

Perspectives:

Full PoC later this year (SoC files + Yocto)

Intel / ST? (study)

Multicore multi-thread IFT

39 / 45

Page 51: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

HardBlare, a hardware/software co-design approach forInformation Flow Control

Guillaume Hiet ↵, Pascal Cotret �

↵ CentraleSupelec, [email protected]� R&D engineer, [email protected]

June 22, 2018

Many thanks to Muhammad, Mounir, Arnab, Vianney and Guy :)

https://hardblare.cominlabs.u-bretagneloire.fr

40 / 45

Page 52: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Bibliography I

Dalton, Kannan, and Kozyrakis 2007. Raksha: A Flexible Information FlowArchitecture for Software Security.

Nagarajan et al. 2008. Dynamic Information Tracking on Multicores.

Kannan, Dalton, and Kozyrakis 2009. Decoupling dynamic informationflow tracking with a dedicated coprocessor.

Deng and Suh 2012. High-performance parallel accelerator for flexible ande�cient run-time monitoring.

Heo et al. 2015. Implementing an Application-Specific Instruction-SetProcessor for System-Level Dynamic Program Analysis Engines.

Wahab et al. 2017. ARMHEx: A hardware extension for DIFT onARM-based SoCs.

41 / 45

Page 53: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Bibliography II

Efstathopoulos et al. 2005. Labels and event processes in the asbestosoperating system.

Zeldovich et al. 2006. Making information flow explicit in HiStar.

Krohn et al. 2007. Information Flow Control for Standard OS Abstractions.

Geller et al. 2011. Information Flow Control for Intrusion Detection derivedfrom MAC policy.

Hauser et al. 2012. A taint marking approach to confidentiality violationdetection.

Newsome and Song 2005. Dynamic taint analysis for automatic detection,analysis, and signature generation of exploits on commodity software.

42 / 45

Page 54: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Bibliography III

Harris, Jha, and Reps 2010. DIFC programs by automatic instrumentation.

Chandra and Franz 2007. Fine-Grained Information Flow Analysis andEnforcement in a Java Virtual Machine.

Nair et al. 2007. A Virtual Machine Based Information Flow ControlSystem for Policy Enforcement.

43 / 45

Page 55: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

Backup slides

Page 56: HardBlare, a hardware/software co-design approach for ... · HardBlare, a hardware/software co-design approach for Information Flow Control Guillaume Hiet ↵, Pascal Cotret ↵ CentraleSup´elec,

TrustZone support

Untrusted area

CPU

ARMHExExecution Trace

Ctrl signals

DIFT-related data

CoreSightcomponents

Memory(used by Linux OS)

Trusted area

Instrumenteddata

ARMHEx CoprocessorSecure

Untrusted area

CPU

ARMHExExecution Trace

Ctrl signals

DIFT-related data

CoreSightcomponents

Memory(used by Linux OS)

Trusted area

Instrumenteddata

ARMHEx CoprocessorSecure

Unauthorizedaccess

45 / 45