2012 IEEE 30th International Conference on Computer Design (ICCD) 2012
DOI: 10.1109/iccd.2012.6378624
|View full text |Cite
|
Sign up to set email alerts
|

A high-performance, low-overhead microarchitecture for secure program execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…This assignment process is shown in Figure 2(c). After the matching 2 Though we arbitrarily chose zero, any code can be assigned to the root. is complete, the nodes in G are assigned Hamming codes as shown in Figure 2(d).…”
Section: B Compile Time Preprocessingmentioning
confidence: 99%
See 2 more Smart Citations
“…This assignment process is shown in Figure 2(c). After the matching 2 Though we arbitrarily chose zero, any code can be assigned to the root. is complete, the nodes in G are assigned Hamming codes as shown in Figure 2(d).…”
Section: B Compile Time Preprocessingmentioning
confidence: 99%
“…These attacks are successful because most programs are written in type-unsafe languages (such as C, or C++) that do not enforce bounds-checking on data inputs. Such attacks can be detected using techniques such as Write xor eXecute (W⊕X), Address Space Layout Randomization (ASLR), stack canaries, and other runtime integrity checking techniques [1], [2]. Attackers can bypass these mechanisms using code reuse attacks (CRAs), such as Return Oriented Programming (ROP), by exploiting vulnerabilities in the above techniques [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, in our application scenario, heart rates are typically generated within 0.5-2.5 s and thus no further optimizations to the detection times are needed. Thus, when comparing our performance results with similar work where code integrity is checked via hardware monitors [26][27][28], our approach presents a faster detection response with the ability to detect zero-day malware without imposing significant performance degradation on the embedded target processor. As shown in [26], using hashes of basic blocks for checking instruction integrity imposes a substantial overhead.…”
Section: Performance Analysismentioning
confidence: 99%
“…In these presented approaches, the methods to detect anomalies depend on monitoring the control flow execution of an application [7,8,24,25] or rely on instruction-based monitoring [26][27][28]. In the former, static analysis of expected program behavior is extracted and then used by hardware monitors to observe the program's execution trace.…”
Section: Prior Workmentioning
confidence: 99%