...
首页> 外文期刊>Internet of Things Journal, IEEE >HCIC: Hardware-Assisted Control-Flow Integrity Checking
【24h】

HCIC: Hardware-Assisted Control-Flow Integrity Checking

机译:HCIC:硬件辅助控制流完整性检查

获取原文
获取原文并翻译 | 示例
           

摘要

Recently, code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (JOP), have emerged as a new class of ingenious security threats. Attackers can utilize CRAs to hijack the control flow of programs to perform malicious actions without injecting any codes. Many defenses, classed into software-based and hardware-based, have been proposed. However, software-based methods are difficult to be deployed in practical systems due to high performance overhead. Hardware-based methods can reduce performance overhead but may require extending instruction set architectures (ISAs) and modifying the compiler or suffer the vulnerability of key leakage. To tackle these issues, this paper proposes a new hardware-assisted control flow checking method to resist CRAs with negligible performance overhead without extending ISAs, modifying the compiler or leaking the encryption/decryption key. The key technique involves two control flow checking mechanisms. The first one is the encrypted Hamming distances matching between the physical unclonable function (PUF) response and the return addresses, which prevents attackers from returning between gadgets so long as the PUF response is secret, thus resisting ROP attacks. The second one is the linear encryption/decryption operation (XOR) between the PUF response and the instructions at target addresses of call and jmp instructions to defeat JOP attacks. Advanced return-based full-function reuse attacks will be prevented with the dynamic key-updating method. Experimental evaluations on benchmarks demonstrate that the proposed method introduces negligible 0.95% runtime overhead and 0.78% binary size overhead on average.
机译:最近,代码重用攻击(CRA),例如面向返回的编程(ROP)和面向跳转的编程(JOP),已经成为一类新颖的安全威胁。攻击者可以利用CRA劫持程序的控制流以执行恶意操作,而无需注入任何代码。已经提出了许多防御措施,分为基于软件的防御和基于硬件的防御。但是,由于高性能开销,基于软件的方法很难在实际系统中部署。基于硬件的方法可以减少性能开销,但是可能需要扩展指令集体系结构(ISA)和修改编译器,或者遭受键泄漏的漏洞。为了解决这些问题,本文提出了一种新的硬件辅助控制流检查方法,以在性能开销可忽略的情况下抵抗CRA,而无需扩展ISA,修改编译器或泄漏加密/解密密钥。关键技术涉及两个控制流检查机制。第一个是物理不可克隆功能(PUF)响应和返回地址之间匹配的加密汉明距离,只要PUF响应是秘密的,就可以防止攻击者在小工具之间返回,从而抵抗ROP攻击。第二个是PUF响应与调用和jmp指令目标地址处的指令之间的线性加密/解密操作(XOR),以克服JOP攻击。动态密钥更新方法将防止基于高级基于返回的全功能重用攻击。在基准上的实验评估表明,所提出的方法平均可忽略不计0.95%的运行时开销和0.78%的二进制大小开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号