2022
DOI: 10.3390/s22041392
|View full text |Cite
|
Sign up to set email alerts
|

Bratter: An Instruction Set Extension for Forward Control-Flow Integrity in RISC-V

Abstract: In recent decades, there has been an increasing number of studies on control flow integrity (CFI), particularly those implementing hardware-assisted CFI solutions that utilize a special instruction set extension. More recently, ARM and Intel, which are prominent processor architectures, also announced instruction set extensions for CFI called branch target identification (BTI) and control-flow enhancement technology (CET), respectively. However, according to our preliminary analysis, they do not support variou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Unlike [51], Shakti-MS does not need additional tables or tag bits to store pointer metadata, which can effectively reduce hardware complexity and storage overhead. Park et al [52] proposed Bratter for forward control flow integrity solution. Batter contains a dedicated CSR Register Branch Tag register and two new instructions for this register.…”
Section: H Securitymentioning
confidence: 99%
“…Unlike [51], Shakti-MS does not need additional tables or tag bits to store pointer metadata, which can effectively reduce hardware complexity and storage overhead. Park et al [52] proposed Bratter for forward control flow integrity solution. Batter contains a dedicated CSR Register Branch Tag register and two new instructions for this register.…”
Section: H Securitymentioning
confidence: 99%
“…Currently, CFI in a processor can be achieved in both Software [29], [30], [31], [32], [33], [34], [35] and hardware. BCI-CFI [34], an implementation of software-based finegrained CFI on the Linux kernel, exhibited an average execution overhead of 19.67%, with the peak overhead attaining 31.2% in test programs.…”
Section: B the Current State Of Defense Against Code Reuse Attacksmentioning
confidence: 99%
“…In Table V, a succinct overview of the instruction tracking modules, namely PTM [30], Intel Processor Trace, and TE [41], employed within the current processor ecosystem is provided. Upon comparative analysis of these methodologies, it becomes evident that FastCFI [37] emerges as a frontrunner in terms of performance.…”
Section: Instruction Tracking Detectionmentioning
confidence: 99%
“…RIMI [4] duplicates memory access instructions and defines domains from which these instructions can be used specifically. Bratter [16] defines a control-flow integrity mechanism purely based on the hints available and a CSR. Stolz et al [17] add instructions to hash and verify the integrity of basic blocks as well as encode and decode code and data pointers.…”
Section: Memory Isolationmentioning
confidence: 99%