2018
DOI: 10.1109/mc.2018.2141035
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Code Reuse Attacks with Branch Prediction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(50 citation statements)
references
References 9 publications
0
39
0
Order By: Relevance
“…In other words, the encoding key represents the context of a particular call sequence. This differentiates HW-CDI from previously proposed control data protection schemes [1], [23], [42], [43]. At the return after finishing Function_A, the ret instruction decodes the return address with the key before loading the return address to the program counter.…”
Section: A Basic Approachmentioning
confidence: 95%
See 2 more Smart Citations
“…In other words, the encoding key represents the context of a particular call sequence. This differentiates HW-CDI from previously proposed control data protection schemes [1], [23], [42], [43]. At the return after finishing Function_A, the ret instruction decodes the return address with the key before loading the return address to the program counter.…”
Section: A Basic Approachmentioning
confidence: 95%
“…To ameliorate the coarse-grained CFI, heuristics about the legitimacy of the target addresses have been introduced [22], e.g., a return target should be the location below the corresponding call site. Additionally, hardware assistance including efforts to utilize branch prediction and monitoring/ debugging features have been proposed for less performance overhead and better distinction of the control flow transfers [22], [23]. Coarse-grained CFI implementations with the hardware support cause generally less performance overhead; however, the vulnerability of the CFI implementations remains more or less intact [17], [24].…”
Section: Control Flow Integrity and Control Data Integritymentioning
confidence: 99%
See 1 more Smart Citation
“…Here, we compare the performance of several commonly-used OOD detection metrics, including Softmax [23], Entropy [23], Energy [38], GradNorm [26] and Mahalanobis distance [34]. We perform OOD detection with MIM pretext task with each metric -the results are shown in Tab.…”
Section: Ood Detection Metric Is Importantmentioning
confidence: 99%
“…Settings for Evaluation Datasets. Following the previous work (Lee et al, 2018), we use a positive (i.e., attacked) and a negative (i.e., benign) dataset to evaluate each defense. Specifically, the positive dataset contains the attacked testset and its augmented version, while the negative dataset contains a benign testset and its augmented version.…”
Section: Main Settingsmentioning
confidence: 99%