A Technique Preventing Code Reuse Attacks Based on RISC Processor
Abstract
A full-process tag inspection system was designed and experimentally verified. This system based on RISC processors can defend code reuse attacks, as well as prevent high overhead caused by the implementation of software fine-grained control flow integrity technology. By extending memory tag, adding special memory-access instructions and setting up security rules, this design achieves hardware-based fine-grained control flow integrity, which can defend against attacks of ROP, JOP and COOP. The experimental measurement have been performed to validate that this design has effective effect on defending CRA with low overhead, which is evaluated on the RISC-V platform.
Keywords
Code reuse attacks, Control flow integrity, Instruction extension, RISC
DOI
10.12783/dtcse/CCNT2018/24682
10.12783/dtcse/CCNT2018/24682
Refbacks
- There are currently no refbacks.