HW-CDI: Hard-Wired Control Data Integrity
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Yongsuk | - |
dc.contributor.author | Lee, Gyungho | - |
dc.date.accessioned | 2021-09-01T22:43:05Z | - |
dc.date.available | 2021-09-01T22:43:05Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2019 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/68906 | - |
dc.description.abstract | Ensuring that a program follows an uncompromised control flow at the machine instruction level can provide sound protection from control flow attacks that transfer a control flow to the attacker's flow during program execution. This paper proposes an enhanced control data protection for control flow integrity called hard wired control data integrity (HW-CDI). The HW-CDI hides the control data via encoding with a key and requires proper decoding with the key for a correct control flow transfer. A unique aspect of HW-CDI is that this key changes in terms of not only the location but also the value of the control data. This paper describes the features necessary to make HW-CDI, an effective approach for securing program control flows with low-performance overhead. More specifically, this paper describes how to incorporate the HW-CDI into the processor's instruction pipeline so that it becomes an integral part of indirect branch instruction execution. It also provides information on how to generate the encoding/decoding keys without additional instrumented code. The HW-CDI is able to differentiate control flow transfer instances, providing context-based protection at negligible performance overhead. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | HW-CDI: Hard-Wired Control Data Integrity | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Gyungho | - |
dc.identifier.doi | 10.1109/ACCESS.2019.2891762 | - |
dc.identifier.scopusid | 2-s2.0-85061174953 | - |
dc.identifier.wosid | 000457968800001 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.7, pp.10811 - 10822 | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 7 | - |
dc.citation.startPage | 10811 | - |
dc.citation.endPage | 10822 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Control data | - |
dc.subject.keywordAuthor | control flow integrity | - |
dc.subject.keywordAuthor | indirect branch | - |
dc.subject.keywordAuthor | instruction set architecture | - |
dc.subject.keywordAuthor | software security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.