Publication | Closed Access
RAGuard
14
Citations
20
References
2017
Year
Unknown Venue
EngineeringComputer ArchitectureFormal VerificationSoftware AnalysisHardware SecurityTrusted Execution EnvironmentSecure ComputingHardware Security SolutionHardware Hash FunctionOperating System SecurityComputer EngineeringComputer ScienceLanguage-based SecurityRaguard HardwareData SecurityCryptographyProgram AnalysisControl-flow IntegritySystem Software
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse attacks, which utilize benign code sequences to realize arbitrary computation. Current approaches can efficiently protect control-flow transfers caused by indirect jumps and function calls (forward-edge CFI). However, they cannot effectively protect control-flow caused by the function return (backward-edge CFI). The reason is that the set of return addresses of the functions that are frequently called can be very large, which might bend the backward-edge CFI. We address this backward-edge CFI problem by proposing a novel hardware-assisted mechanism (RAGuard) that binds a message authentication code to each return address and enhances security via a physical unclonable function and a hardware hash function. The message authentication codes can be stored on the program stack with return address. RAGuard hardware automatically verifies the integrity of return addresses. Our experiments show that for a subset of the SPEC CPU2006 benchmarks, RAGuard incurs 1.86% runtime overheads on average with no need for OS support.
| Year | Citations | |
|---|---|---|
Page 1
Page 1