Indirect Branch Validation Unit
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Gyungho | - |
dc.contributor.author | Shi, Yixin | - |
dc.contributor.author | Lin, Hui | - |
dc.date.accessioned | 2021-09-08T13:07:53Z | - |
dc.date.available | 2021-09-08T13:07:53Z | - |
dc.date.created | 2021-06-11 | - |
dc.date.issued | 2009-10 | - |
dc.identifier.issn | 0141-9331 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/119238 | - |
dc.description.abstract | This paper presents a micro-architectural enhancement, named Indirect Branch Validation Unit (IBVU), to prevent malicious attacks from compromising the control data of the program. The IBVU provides a run-time control flow protection by validating a dynamic instance of an indirect branch's address and its target address - indirect branch pair (IBP), which represents the program behavior. To validate an IBP at run-time with little performance and storage overhead, the IBVU employs a Bloom filter, a hashing based bit vector representation for querying a set membership. Two organizations trading off of the access delay and space in VLSI design are provided, and three commonly used hashing schemes are evaluated for the performance impact as well as the area overhead. Recognizing potential false positives from adopting the Bloom filter, consideration of reducing it per the Bloom filter's design parameters is discussed, while the difficulty of utilizing the false positives due to hashing based indexing of the Bloom filter for malicious attack is noted. (C) 2009 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.title | Indirect Branch Validation Unit | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Gyungho | - |
dc.identifier.doi | 10.1016/j.micpro.2009.09.002 | - |
dc.identifier.scopusid | 2-s2.0-70350506103 | - |
dc.identifier.wosid | 000272332600005 | - |
dc.identifier.bibliographicCitation | MICROPROCESSORS AND MICROSYSTEMS, v.33, no.7-8, pp.461 - 468 | - |
dc.relation.isPartOf | MICROPROCESSORS AND MICROSYSTEMS | - |
dc.citation.title | MICROPROCESSORS AND MICROSYSTEMS | - |
dc.citation.volume | 33 | - |
dc.citation.number | 7-8 | - |
dc.citation.startPage | 461 | - |
dc.citation.endPage | 468 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | Control data | - |
dc.subject.keywordAuthor | Indirect branch | - |
dc.subject.keywordAuthor | Branch prediction | - |
dc.subject.keywordAuthor | Software attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.