2022
DOI: 10.14569/ijacsa.2022.0130896
|View full text |Cite
|
Sign up to set email alerts
|

Watchdog Monitoring for Detecting and Handling of Control Flow Hijack on RISC-V-based Binaries

Abstract: Control flow hijacking has been a major challenge in software security. Several means of protections have been developed but insecurities persist. This is because existing protections have sometimes been circumvented while some resilient protections do not cover all applications. Studies have revealed that a holistic way of tackling software insecurity could involve watchdog monitoring and detection via Control Flow Integrity (CFI). The CFI concept has shown a good measure of reliability to mitigate control fl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Exploitation via ROP is still a challenge in software securities. Possible mitigation for the DoS demonstrated here is demonstrated by Oyinloye et al, (2022) using a watchdog monitoring process. The watchdog monitoring is based on timing-out depending on the log taken from the previous function epilogue.…”
Section: Discussionmentioning
confidence: 96%
See 1 more Smart Citation
“…Exploitation via ROP is still a challenge in software securities. Possible mitigation for the DoS demonstrated here is demonstrated by Oyinloye et al, (2022) using a watchdog monitoring process. The watchdog monitoring is based on timing-out depending on the log taken from the previous function epilogue.…”
Section: Discussionmentioning
confidence: 96%
“…In demonstrating ROP here, we show how these instructions can be used with regards to their distinct advantages for changing values held on the stack and inside useful registers and then changing the behaviour of the process. Portions of the constructed input were also featured in recent work by Oyinloye et al (2022). However, specific highlight here is on gadgets with ret that do not contain any instruction to load a fake ra, thereby leading to a trap for the input.…”
Section: Chaining the Gadgets For Specific Goalsmentioning
confidence: 99%