2022
DOI: 10.1109/access.2022.3170479
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data

Abstract: An increasing number of embedded systems include dedicated neural hardware. To benefit from this specialized hardware, deep learning techniques to discover malware on embedded systems are needed. This effort evaluated candidate machine learning detection techniques for distinguishing exploited from nonexploited RISC-V program behavior using execution traces. We first developed a dataset of execution traces containing Return Oriented Programming (ROP) exploitation on the RISC-V Instruction Set Architecture (ISA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Like DeepCheck, HeNet [122] is a CFI technique that leverages IPT to analyze the execution state of a program, but adopts a hierarchical ensemble of DNNs to enhance ROP detection accuracy. More recently, Koranek et al [123] developed specialized LSTM models to analyze RISC-V ISA execution traces and determine whether they were subject to ROP exploitation.…”
Section: B Influence Of Emerging Technologies 1) Machine Learningmentioning
confidence: 99%
“…Like DeepCheck, HeNet [122] is a CFI technique that leverages IPT to analyze the execution state of a program, but adopts a hierarchical ensemble of DNNs to enhance ROP detection accuracy. More recently, Koranek et al [123] developed specialized LSTM models to analyze RISC-V ISA execution traces and determine whether they were subject to ROP exploitation.…”
Section: B Influence Of Emerging Technologies 1) Machine Learningmentioning
confidence: 99%
“…A recent study by Koranek et al (2022) also focused on ROP on RISC-V to proffer solutions towards detection of ROP on RISC-V by using deep learning (DL) models to distinguish features from execution trace. Koranek et al analysed branch patterns in ROP as valuable information towards ROP detection.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to this, the existing protections have not reasonably considered vulnerability of RISC-V-based binaries. Apart from the knowledge of underlying dangers of ROP on RISC-V, recent study by Koranek et al (2022) also presents models that were developed with focus on ROP gadgets as valuable resource for ML towards detection of possible ROP. Understanding of the behaviour of gadgets would be useful in this regard.…”
Section: Introductionmentioning
confidence: 99%
“…Authors in [1] conducted a thorough investigation to detect a fault using a counter-based built-in self-test strategy in a Rocket RISC-V microprocessor prototyped on FPGA. This study [2] created a dataset of execution traces containing Return Oriented Programming (ROP) exploitation on the RISC-V Instruction Set Architecture and used deep learning AI models like long shortterm memory (LSTM) to distinguish exploited traces from non-exploited traces to detect ROP attacks. The authors in [3] proposed a methodology to perform real-time monitoring of software that kept track of hardware performance counters executing on embedded processors in cyber-physical systems.…”
Section: Introductionmentioning
confidence: 99%