Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Indirect Branch Validation Unit

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Gyungho-
dc.contributor.authorShi, Yixin-
dc.contributor.authorLin, Hui-
dc.date.accessioned2021-09-08T13:07:53Z-
dc.date.available2021-09-08T13:07:53Z-
dc.date.created2021-06-11-
dc.date.issued2009-10-
dc.identifier.issn0141-9331-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/119238-
dc.description.abstractThis paper presents a micro-architectural enhancement, named Indirect Branch Validation Unit (IBVU), to prevent malicious attacks from compromising the control data of the program. The IBVU provides a run-time control flow protection by validating a dynamic instance of an indirect branch's address and its target address - indirect branch pair (IBP), which represents the program behavior. To validate an IBP at run-time with little performance and storage overhead, the IBVU employs a Bloom filter, a hashing based bit vector representation for querying a set membership. Two organizations trading off of the access delay and space in VLSI design are provided, and three commonly used hashing schemes are evaluated for the performance impact as well as the area overhead. Recognizing potential false positives from adopting the Bloom filter, consideration of reducing it per the Bloom filter's design parameters is discussed, while the difficulty of utilizing the false positives due to hashing based indexing of the Bloom filter for malicious attack is noted. (C) 2009 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE BV-
dc.titleIndirect Branch Validation Unit-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Gyungho-
dc.identifier.doi10.1016/j.micpro.2009.09.002-
dc.identifier.scopusid2-s2.0-70350506103-
dc.identifier.wosid000272332600005-
dc.identifier.bibliographicCitationMICROPROCESSORS AND MICROSYSTEMS, v.33, no.7-8, pp.461 - 468-
dc.relation.isPartOfMICROPROCESSORS AND MICROSYSTEMS-
dc.citation.titleMICROPROCESSORS AND MICROSYSTEMS-
dc.citation.volume33-
dc.citation.number7-8-
dc.citation.startPage461-
dc.citation.endPage468-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorControl data-
dc.subject.keywordAuthorIndirect branch-
dc.subject.keywordAuthorBranch prediction-
dc.subject.keywordAuthorSoftware attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Informatics > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE