2012 39th Annual International Symposium on Computer Architecture (ISCA) 2012
DOI: 10.1109/isca.2012.6237009
|View full text |Cite
|
Sign up to set email alerts
|

Branch regulation: Low-overhead protection from code reuse attacks

Abstract: Code reuse attacks (CRAs) are recent security exploits that allow attackers to execute arbitrary code on a compromised machine. CRAs, exemplified by return-oriented and jump-oriented programming approaches, reuse fragments of the library code, thus avoiding the need for explicit injection of attack code on the stack. Since the executed code is reused existing code, CRAs bypass current hardware and software security measures that prevent execution from data or stack regions of memory. While softwarebased full c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 31 publications
(37 citation statements)
references
References 26 publications
0
37
0
Order By: Relevance
“…In response, attackers have evolved to use the so-called code-reuse attacks (CRAs). CRAs, including both return-oriented [57] and jump-oriented [11] variations remain open vulnerabilities and active research topics, despite some promising solutions [48,70,36,37]. An orthogonal line of research pursues protection of application secrets even in the presence of compromised system software layers and malware [23,25,42].…”
Section: Related Workmentioning
confidence: 99%
“…In response, attackers have evolved to use the so-called code-reuse attacks (CRAs). CRAs, including both return-oriented [57] and jump-oriented [11] variations remain open vulnerabilities and active research topics, despite some promising solutions [48,70,36,37]. An orthogonal line of research pursues protection of application secrets even in the presence of compromised system software layers and malware [23,25,42].…”
Section: Related Workmentioning
confidence: 99%
“…The idea of Branch Regulation was originally presented in our paper that appeared in the 2012 International Symposium on Computer Architecture (ISCA) [17]. The current submission extends the original ISCA paper in the following ways:…”
Section: Summary Of New Materialsmentioning
confidence: 94%
“…As we discussed previously, a shadow call stack is a mechanism that has been proposed to defend against simple ROP attacks [28]- [30], [41]. SCRAP relies on a hardware implementation of the call stack, which is backed up by a larger software stack.…”
Section: Integrating State Counters Into Secure Call Stackmentioning
confidence: 99%
“…Kayaalp et al [41] propose branch regulation, a hardware supported techniques to protect against JOPs. Using binary rewriting, they insert markers at the beginning of every function, which include a magic number to mark a legal function entry, as well as the length of the function.…”
Section: Cra Attacks and Defensesmentioning
confidence: 99%