Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI Schemes

نویسندگان

چکیده

Subverting the flow of instructions (e.g., by use code-reuse attacks) still poses a serious threat to security today’s systems. Various control integrity (CFI) schemes have been proposed as powerful technique detect and mitigate such attacks. In recent years, many hardware-assisted implementations CFI enforcement based on graphs (CFGs) presented academia. Such approaches check whether transfers follow intended CFG limiting valid target addresses. However, these papers all different platforms were evaluated with sets benchmark applications, which makes quantitative comparisons hardly possible. For this paper, we implemented multiple promising CFG-based common platform comprising RISC-V within FPGA. By porting almost 40 applications system can present meaningful comparison various techniques in terms run-time performance, hardware utilization, binary size. addition, an enhanced approach that is inspired what consider best concepts ideas previously mechanisms. We made more practical feature-complete tackling some problems largely ignored previously. show fine-grained scheme be achieved even less overheads than demonstrated.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a comparative pragmatic analysis of the speech act of “disagreement” across english and persian

the speech act of disagreement has been one of the speech acts that has received the least attention in the field of pragmatics. this study investigates the ways power relations, social distance, formality of the context, gender, and language proficiency (for efl learners) influence disagreement and politeness strategies. the participants of the study were 200 male and female native persian s...

15 صفحه اول

A survey of Hardware-based Control Flow Integrity (CFI)

Control Flow Integrity (CFI) is a computer security technique that detects runtime attacks by monitoring a program’s branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many a...

متن کامل

comparative genre analysis of english newspaper editorials across english and persian

the present research was conducted to accomplish two purposes. firstly, it aimed to explore and describe schematic structure or what halliday and hassan (1989, p.64) have called “generic structure potential” (gsp) of american english, iranian persian and iranian english newspaper editorials within systemic functional linguistics. secondly, a quantitative cross-comparison was made to investigate...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions in Embedded Computing Systems

سال: 2021

ISSN: ['1539-9087', '1558-3465']

DOI: https://doi.org/10.1145/3476989