Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

HW-CDI: Hard-Wired Control Data Integrity

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Yongsuk-
dc.contributor.authorLee, Gyungho-
dc.date.accessioned2021-09-01T22:43:05Z-
dc.date.available2021-09-01T22:43:05Z-
dc.date.created2021-06-19-
dc.date.issued2019-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/68906-
dc.description.abstractEnsuring that a program follows an uncompromised control flow at the machine instruction level can provide sound protection from control flow attacks that transfer a control flow to the attacker's flow during program execution. This paper proposes an enhanced control data protection for control flow integrity called hard wired control data integrity (HW-CDI). The HW-CDI hides the control data via encoding with a key and requires proper decoding with the key for a correct control flow transfer. A unique aspect of HW-CDI is that this key changes in terms of not only the location but also the value of the control data. This paper describes the features necessary to make HW-CDI, an effective approach for securing program control flows with low-performance overhead. More specifically, this paper describes how to incorporate the HW-CDI into the processor's instruction pipeline so that it becomes an integral part of indirect branch instruction execution. It also provides information on how to generate the encoding/decoding keys without additional instrumented code. The HW-CDI is able to differentiate control flow transfer instances, providing context-based protection at negligible performance overhead.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleHW-CDI: Hard-Wired Control Data Integrity-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Gyungho-
dc.identifier.doi10.1109/ACCESS.2019.2891762-
dc.identifier.scopusid2-s2.0-85061174953-
dc.identifier.wosid000457968800001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.7, pp.10811 - 10822-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume7-
dc.citation.startPage10811-
dc.citation.endPage10822-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorControl data-
dc.subject.keywordAuthorcontrol flow integrity-
dc.subject.keywordAuthorindirect branch-
dc.subject.keywordAuthorinstruction set architecture-
dc.subject.keywordAuthorsoftware security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Informatics > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE