Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI Schemes
نویسندگان
چکیده
Subverting the flow of instructions (e.g., by use code-reuse attacks) still poses a serious threat to security today’s systems. Various control integrity (CFI) schemes have been proposed as powerful technique detect and mitigate such attacks. In recent years, many hardware-assisted implementations CFI enforcement based on graphs (CFGs) presented academia. Such approaches check whether transfers follow intended CFG limiting valid target addresses. However, these papers all different platforms were evaluated with sets benchmark applications, which makes quantitative comparisons hardly possible. For this paper, we implemented multiple promising CFG-based common platform comprising RISC-V within FPGA. By porting almost 40 applications system can present meaningful comparison various techniques in terms run-time performance, hardware utilization, binary size. addition, an enhanced approach that is inspired what consider best concepts ideas previously mechanisms. We made more practical feature-complete tackling some problems largely ignored previously. show fine-grained scheme be achieved even less overheads than demonstrated.
منابع مشابه
a comparative analysis of the marginal microleakages of two pit and fissure sealans, conseal-f and conseal clear
چکیده ندارد.
15 صفحه اولa comparative pragmatic analysis of the speech act of “disagreement” across english and persian
the speech act of disagreement has been one of the speech acts that has received the least attention in the field of pragmatics. this study investigates the ways power relations, social distance, formality of the context, gender, and language proficiency (for efl learners) influence disagreement and politeness strategies. the participants of the study were 200 male and female native persian s...
15 صفحه اولA survey of Hardware-based Control Flow Integrity (CFI)
Control Flow Integrity (CFI) is a computer security technique that detects runtime attacks by monitoring a program’s branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many a...
متن کاملcomparative analysis of the use of hedges & emphatics in english and persian academic research articles of sociology & psychology
چکیده ندارد.
15 صفحه اولcomparative genre analysis of english newspaper editorials across english and persian
the present research was conducted to accomplish two purposes. firstly, it aimed to explore and describe schematic structure or what halliday and hassan (1989, p.64) have called “generic structure potential” (gsp) of american english, iranian persian and iranian english newspaper editorials within systemic functional linguistics. secondly, a quantitative cross-comparison was made to investigate...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions in Embedded Computing Systems
سال: 2021
ISSN: ['1539-9087', '1558-3465']
DOI: https://doi.org/10.1145/3476989