We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: PAIRS: Control Flow Protection using Phantom Addressed Instructions

Abstract: Code-reuse attacks continue to pose a significant threat to systems security, from resource constrained environments to data-centers. Current mitigation techniques suffer from significant performance and energy overheads especially in the embedded domain. A viable alternative which, thus far, has been a software only mitigation, is Execution Path Randomization (EPR). The basic idea in EPR is to frequently switch between two distinct program variants forcing the attacker to gamble on which code to reuse. In this paper, we propose a novel technique, the Phantom Addressed Instructions that are Randomly Selected (PAIRS) that enables an efficient implementation of EPR with minor hardware adjustments and no source code modifications. For certain modes of operation, PAIRS does not require program re-compilation, thus is applicable to legacy binaries. Compared to state-of-the-art defenses, PAIRS has negligible performance overheads making it viable for embedded IoT devices up to server-grade systems.
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
Cite as: arXiv:1911.02038 [cs.CR]
  (or arXiv:1911.02038v1 [cs.CR] for this version)

Submission history

From: Miguel Arroyo [view email]
[v1] Tue, 5 Nov 2019 19:02:53 GMT (991kb,D)

Link back to: arXiv, form interface, contact.