2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016
DOI: 10.1109/hst.2016.7495554
|View full text |Cite
|
Sign up to set email alerts
|

Controlling your control flow graph

Abstract: Code Reuse Attacks (CRAs) are software exploits in which an attacker directs program control flow through existing code without injecting malicious code to achieve his objective. In this paper, we propose Dynamic Sequence Checker (DSC), a framework to verify the validity of control flow between basic blocks in the program. Unique codes are assigned to every basic block in the program at compile time in such a way that the Hamming distance between two legally connected basic blocks is a known constant. At runti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Regarding research into mechanisms, we will leverage existing lightweight hardware protection mechanisms [31] and integrate CFIEE's data support to investigate a more secure and efficient hardware-based RISC-V CFI mechanism. Furthermore, the metadata utilized in the hardware CFI mechanism has the potential for additional compression [32].…”
Section: Discussionmentioning
confidence: 99%
“…Regarding research into mechanisms, we will leverage existing lightweight hardware protection mechanisms [31] and integrate CFIEE's data support to investigate a more secure and efficient hardware-based RISC-V CFI mechanism. Furthermore, the metadata utilized in the hardware CFI mechanism has the potential for additional compression [32].…”
Section: Discussionmentioning
confidence: 99%
“…String comparison and pattern matching are omnipresent in SE, appearing in areas of static and dynamic analysis, such as test selection and generation [46,87,60,35], code coverage inspection [35,34], log or trace analysis [24,55,56,49], and cybersecurity [24,80,38,77]. The authors of these papers represent a collection of SE artifacts as symbols in a string.…”
Section: String Comparisonmentioning
confidence: 99%
“…In bioinformatics (BI), it is used for DNA sequence comparison [20,25]. It is also omnipresent in software engineering (SE), appearing in areas of static and dynamic analysis, such as test selection and generation [17,34,22,12], code coverage inspection [12,11], log or trace analysis [9], and cybersecurity [9,30,13,29]. The authors of these papers represent a collection of SE artifacts as symbols in a string.…”
Section: Introductionmentioning
confidence: 99%