2019
DOI: 10.1109/jiot.2018.2866164
|View full text |Cite
|
Sign up to set email alerts
|

HCIC: Hardware-Assisted Control-Flow Integrity Checking

Abstract: Recently, code reuse attacks (CRAs), such as returnoriented programming (ROP) and jump-oriented programming (JOP), have emerged as a new class of ingenious security threats. Attackers can utilize CRAs to hijack the control flow of programs to perform malicious actions without injecting any codes. Many defenses, classed into software-based and hardware-based, have been proposed. However, software-based methods are difficult to be deployed in practical systems due to high performance overhead. Hardware-based met… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 48 publications
(34 citation statements)
references
References 44 publications
0
34
0
Order By: Relevance
“…Even with the same design, different manufactured PUFs have different CRPs [23] . It is suitable for various security-related applications, such as two-factor authentication [24] , antioverbuilding [25] , IP protection [23,26] , and resisting of FPGA replay attacks [27] and code-reuse attacks [28] .…”
Section: Pufmentioning
confidence: 99%
“…Even with the same design, different manufactured PUFs have different CRPs [23] . It is suitable for various security-related applications, such as two-factor authentication [24] , antioverbuilding [25] , IP protection [23,26] , and resisting of FPGA replay attacks [27] and code-reuse attacks [28] .…”
Section: Pufmentioning
confidence: 99%
“…However, researches are ongoing to improve the security and performance of CFI and make it practical. In particular, studies to achieve performance improvement of CFI through hardware support deserve attention [28]- [34]. For the comprehensive understanding on CFI, Burow et al [15] compare the precision, security, and performance of various CFI implementations.…”
Section: Related Workmentioning
confidence: 99%
“…However, library call intensive programs can be affected if time delays accumulate. In this situation, hardware aided protection schemes can be effective for better performance [32]- [34].…”
Section: Performancementioning
confidence: 99%
“…Besides, a RO PUF does not require high symmetry and thereby is more easily to be implemented on FPGAs than other PUFs such as Arbiter PUF. In past decades, PUFs have attracted much attention in academia and industry for various security related applications such as hardware IP protection [3] [25], device authentication [8] [30] [34] and software security [31].…”
Section: Introductionmentioning
confidence: 99%