首页> 外文期刊>Embedded Systems Letters, IEEE >Customized Instructions for Protection Against Memory Integrity Attacks
【24h】

Customized Instructions for Protection Against Memory Integrity Attacks

机译:防止内存完整性攻击的自定义说明

获取原文
获取原文并翻译 | 示例

摘要

Customized instructions have typically been used for enhancing the performance of embedded systems. However, the use of finding dedicated instructions for security has been rather limited. On the contrary, modern processors are crippled by the threats of memory integrity attacks, which typically target the control flow of a program and are mitigated at the software level. In this letter, we analyze the memory exploitation codes being developed as a part of the Cyber Security Awareness Week-2016 competition, which are based on unsecurednmemcpynand return address modification by buffer overflow on OpenRISC and RISC-V architectures, and implement protections at the hardware level. We added eight new instructions to handle the four exploits by designing dedicated hardware stack and a module for checking against buffer overflow. We have also performed a validation on RISC-V platform and introduced two new custom instructions to ensure security from unboundednmemcpyn. The proposed countermeasures and the new instructions are validated on field programmable gate array platform.
机译:定制指令通常已用于增强嵌入式系统的性能。但是,查找专用于安全性的专用指令的使用受到了很大的限制。相反,现代处理器会受到内存完整性攻击的威胁,这些攻击通常以程序的控制流为目标,并在软件级别得到缓解。在这封信中,我们将分析作为2016年网络安全意识周竞赛的一部分而开发的内存利用代码,这些代码基于不安全的 memcpy 通过在OpenRISC和RISC-V体系结构上的缓冲区溢出来修改返回地址,并在硬件级别实施保护。我们通过设计专用的硬件堆栈和用于检查缓冲区溢出的模块,添加了八条新指令来处理这四个漏洞。我们还在RISC-V平台上进行了验证,并引入了两个新的自定义指令来确保不受限制的安全性。 memcpy n 。在现场可编程门阵列平台上对提出的对策和新指令进行了验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号