File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

문현곤

Moon, Hyungon
Computer Systems Security Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace GR -
dc.citation.conferencePlace Heraklion -
dc.citation.endPage 358 -
dc.citation.startPage 337 -
dc.citation.title International Symposium on Research in Attacks, Intrusions and Defenses -
dc.contributor.author Belleville, Brian -
dc.contributor.author Moon, Hyungon -
dc.contributor.author Shin, Jangseop -
dc.contributor.author Hwang, Dongil -
dc.contributor.author Nash, Joseph Michael -
dc.contributor.author Jung, Seonhwa -
dc.contributor.author Na, Yeoul -
dc.contributor.author Volckaert, Stijn -
dc.contributor.author Larsen, Per -
dc.contributor.author Paek, Yunheung -
dc.contributor.author Franz, Michael -
dc.date.accessioned 2024-02-01T01:36:25Z -
dc.date.available 2024-02-01T01:36:25Z -
dc.date.created 2018-08-14 -
dc.date.issued 2018-09-11 -
dc.description.abstract Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space Randomization (DSR). DSR classifies program variables into a set of equivalence classes, and encrypts variables with a key randomly chosen for each equivalence class. This thwarts memory corruption attacks that introduce illegitimate data flows. However, existing implementations of DSR trade precision for better run-time performance, which leaves attackers sufficient leeway to mount attacks. In this paper, we show that high precision and good run-time performance are not mutually exclusive. We present HARD, a precise and efficient hardware-assisted implementation of DSR. HARD distinguishes a larger number of equivalence classes, and incurs lower run-time overhead than software-only DSR. Our implementation achieves run-time overheads of just 6.61% on average, while the software version with the same protection costs 40.96%. -
dc.identifier.bibliographicCitation International Symposium on Research in Attacks, Intrusions and Defenses, pp.337 - 358 -
dc.identifier.doi 10.1007/978-3-030-00470-5_16 -
dc.identifier.issn 0302-9743 -
dc.identifier.scopusid 2-s2.0-85053930956 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/80942 -
dc.identifier.url https://link.springer.com/chapter/10.1007%2F978-3-030-00470-5_16 -
dc.language 영어 -
dc.publisher 21st International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2018 -
dc.title Hardware Assisted Randomization of Data -
dc.type Conference Paper -
dc.date.conferenceDate 2018-09-10 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.