There are no files associated with this item.
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.conferencePlace | GR | - |
dc.citation.conferencePlace | Heraklion | - |
dc.citation.endPage | 358 | - |
dc.citation.startPage | 337 | - |
dc.citation.title | International Symposium on Research in Attacks, Intrusions and Defenses | - |
dc.contributor.author | Belleville, Brian | - |
dc.contributor.author | Moon, Hyungon | - |
dc.contributor.author | Shin, Jangseop | - |
dc.contributor.author | Hwang, Dongil | - |
dc.contributor.author | Nash, Joseph Michael | - |
dc.contributor.author | Jung, Seonhwa | - |
dc.contributor.author | Na, Yeoul | - |
dc.contributor.author | Volckaert, Stijn | - |
dc.contributor.author | Larsen, Per | - |
dc.contributor.author | Paek, Yunheung | - |
dc.contributor.author | Franz, Michael | - |
dc.date.accessioned | 2024-02-01T01:36:25Z | - |
dc.date.available | 2024-02-01T01:36:25Z | - |
dc.date.created | 2018-08-14 | - |
dc.date.issued | 2018-09-11 | - |
dc.description.abstract | Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space Randomization (DSR). DSR classifies program variables into a set of equivalence classes, and encrypts variables with a key randomly chosen for each equivalence class. This thwarts memory corruption attacks that introduce illegitimate data flows. However, existing implementations of DSR trade precision for better run-time performance, which leaves attackers sufficient leeway to mount attacks. In this paper, we show that high precision and good run-time performance are not mutually exclusive. We present HARD, a precise and efficient hardware-assisted implementation of DSR. HARD distinguishes a larger number of equivalence classes, and incurs lower run-time overhead than software-only DSR. Our implementation achieves run-time overheads of just 6.61% on average, while the software version with the same protection costs 40.96%. | - |
dc.identifier.bibliographicCitation | International Symposium on Research in Attacks, Intrusions and Defenses, pp.337 - 358 | - |
dc.identifier.doi | 10.1007/978-3-030-00470-5_16 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.scopusid | 2-s2.0-85053930956 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/80942 | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007%2F978-3-030-00470-5_16 | - |
dc.language | 영어 | - |
dc.publisher | 21st International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2018 | - |
dc.title | Hardware Assisted Randomization of Data | - |
dc.type | Conference Paper | - |
dc.date.conferenceDate | 2018-09-10 | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.