BROWSE

Related Researcher

Author's Photo

Moon, Hyungon
Computer Systems Security Lab
Research Interests
  • Computer system security

ITEM VIEW & DOWNLOAD

Hardware Assisted Randomization of Data

Cited 0 times inthomson ciCited 0 times inthomson ci
Title
Hardware Assisted Randomization of Data
Author
Belleville, BrianMoon, HyungonShin, JangseopHwang, DongilNash, Joseph MichaelJung, SeonhwaNa, YeoulVolckaert, StijnLarsen, PerPaek, YunheungFranz, Michael
Issue Date
2018-09-11
Publisher
21st International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2018
Citation
International Symposium on Research in Attacks, Intrusions and Defenses, pp.337 - 358
Abstract
Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space Randomization (DSR). DSR classifies program variables into a set of equivalence classes, and encrypts variables with a key randomly chosen for each equivalence class. This thwarts memory corruption attacks that introduce illegitimate data flows. However, existing implementations of DSR trade precision for better run-time performance, which leaves attackers sufficient leeway to mount attacks. In this paper, we show that high precision and good run-time performance are not mutually exclusive. We present HARD, a precise and efficient hardware-assisted implementation of DSR. HARD distinguishes a larger number of equivalence classes, and incurs lower run-time overhead than software-only DSR. Our implementation achieves run-time overheads of just 6.61% on average, while the software version with the same protection costs 40.96%.
URI
https://scholarworks.unist.ac.kr/handle/201301/33419
URL
https://link.springer.com/chapter/10.1007%2F978-3-030-00470-5_16
DOI
10.1007/978-3-030-00470-5_16
ISSN
0302-9743
Appears in Collections:
CSE_Conference Papers
Files in This Item:
There are no files associated with this item.

find_unist can give you direct access to the published full text of this article. (UNISTARs only)

Show full item record

qrcode

  • mendeley

    citeulike

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

MENU