首页> 外文会议>IEEE International Verification and Security Workshop >Using Hardware Performance Counters to Detect Control Hijacking Attacks
【24h】

Using Hardware Performance Counters to Detect Control Hijacking Attacks

机译:使用硬件性能计数器检测控制劫持攻击

获取原文

摘要

Code reuse techniques can circumvent existing security measures. For example, attacks such as Return Oriented Programming (ROP) use fragments of the existing code base to create an attack. Since this code is already in the system, the Data Execution Prevention methods cannot prevent the execution of this reorganised code. Existing software-based Control Flow Integrity can prevent this attack, but the overhead is enormous. Most of the improved methods utilise reduced granularity in exchange for a small performance overhead. Hardware-based detection also faces the same performance overhead and accuracy issues. Benefit from HPC's large-area loading on modern CPU chips, we propose a detection method based on the monitoring of hardware performance counters, which is a lightweight system-level detection for malicious code execution to solve the restrictions of other software and hardware security measures, and is not as complicated as Control Flow Integrity.
机译:代码重用技术可以规避现有的安全措施。例如,返回面向返回的编程(ROP)使用现有代码库的片段来创建攻击。由于此代码已经在系统中,数据执行预防方法无法防止执行此重组代码。现有的基于软件的控制流程完整性可以防止这种攻击,但开销是巨大的。大多数改进的方法利用粒度降低,以换取小的性能开销。基于硬件的检测也面临相同的性能开销和准确性问题。从现代CPU芯片上的HPC大区域加载中受益,我们提出了一种基于硬件性能计数器监控的检测方法,这是一种轻量级系统级检测,用于恶意代码执行,以解决其他软件和硬件安全措施的限制,并不像控制流完整性那样复杂。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号